Management, compliance & auditing
Management, compliance & auditing
Transparency is essential for privacy. Find out the top things you can do right (and wrong) when it comes to privacy policies.
April 20, 2022
Ralph O'Brien
Management, compliance & auditing
Discover the intersection of technology, data security and the law with the CIPT learning path.
April 20, 2022
Ellen Pincus
Management, compliance & auditing
What is the difference between data privacy and data protection in cybersecurity?
April 18, 2022
Ralph O'Brien
Management, compliance & auditing
Too many businesses are dangerously ignorant about NIST 800-171. That’s the battle cry from Dave Hatter, an in-the-trench cyber defender and Infosec author.
April 18, 2022
Ellen Pincus
Management, compliance & auditing
What is it like to work as a data privacy consultant in the cybersecurity industry?
April 14, 2022
Ralph O'Brien
Management, compliance & auditing
The United States and Europe have very different laws governing privacy. Find out how they differ.
April 12, 2022
Ralph O'Brien
Management, compliance & auditing
Global connection has a unique set of privacy standards to navigate.
March 18, 2022
Ralph O'Brien
Management, compliance & auditing
How to build a FedRAMP certification and compliance team at your company.
November 02, 2021
Kurt Ellzey
Management, compliance & auditing
Learn about SOC 3 compliance, how it differs from SOC 1 and SOC 2, and how to prepare for a SOC 3 audit.
October 20, 2021
Howard Poston
Management, compliance & auditing
Learn about SOC 2 compliance, how it differs from SOC 1 and SOC 3, and how to prepare for an SOC 2 audit.
October 19, 2021
Howard PostonIn this series
- The top security architect interview questions you need to know
- Top 10 cybersecurity best practices: Secure your organization’s data
- Is AI cybersecurity in your policies?
- Federal privacy and cybersecurity enforcement — an overview
- U.S. privacy and cybersecurity laws — an overview
- Common misperceptions about PCI DSS: Let’s dispel a few myths
- How PCI DSS acts as an (informal) insurance policy
- Keeping your team fresh: How to prevent employee burnout
- How foundations of U.S. law apply to information security
- Data protection Pandora's Box: Get privacy right the first time, or else
- Privacy dos and don'ts: Privacy policies and the right to transparency
- Starr McFarland talks privacy: 5 things to know about the new, online IAPP CIPT learning path
- Data protection vs. data privacy: What’s the difference?
- NIST 800-171: 6 things you need to know about this new learning path
- Working as a data privacy consultant: Cleaning up other people’s mess
- 6 ways that U.S. and EU data privacy laws differ
- Navigating local data privacy standards in a global world
- Building your FedRAMP certification and compliance team
- SOC 3 compliance: Everything your organization needs to know
- SOC 2 compliance: Everything your organization needs to know
- SOC 1 compliance: Everything your organization needs to know
- Overview: Understanding SOC compliance: SOC 1 vs. SOC 2 vs. SOC 3
- How to comply with FCPA regulation – 5 Tips
- ISO 27001 framework: What it is and how to comply
- Why data classification is important for security
- Threat Modeling 101: Getting started with application security threat modeling [2021 update]
- VLAN network segmentation and security- chapter five [updated 2021]
- CCPA vs CalOPPA: Which one applies to you and how to ensure data security compliance
- IT auditing and controls – planning the IT audit [updated 2021]
- Finding security defects early in the SDLC with STRIDE threat modeling [updated 2021]
- Cyber threat analysis [updated 2021]
- Rapid threat model prototyping: Introduction and overview
- Commercial off-the-shelf IoT system solutions: A risk assessment
- A school district's guide for Education Law §2-d compliance
- IT auditing and controls: A look at application controls [updated 2021]
- 6 key elements of a threat model
- Top threat modeling frameworks: STRIDE, OWASP Top 10, MITRE ATT&CK framework and more
- Average IT manager salary in 2021
- Security vs. usability: Pros and cons of risk-based authentication
- Threat modeling: Technical walkthrough and tutorial
- Comparing endpoint security: EPP vs. EDR vs. XDR
- Role and purpose of threat modeling in software development
- 5 changes the CPRA makes to the CCPA that you need to know
- 6 benefits of cyber threat modeling
- What is threat modeling?
- First Safe Harbor, then Privacy Shield: What EU-US data-sharing agreement is next?
- How to make cybersecurity budget cuts without sacrificing security
- How to mitigate security risk in international business environments
- Security theatrics or strategy? Optimizing security budget efficiency and effectiveness
- NY SHIELD Act: Security awareness and training requirements for New York businesses