Management, compliance & auditing
Management, compliance & auditing
After several years of job progression through an organization’s IT and information security chain of command, many will land many at the doorstep of what
January 25, 2019
Greg Belding
Management, compliance & auditing
Over the last few years, cyber-crimes have grown in number and in the ways cybercriminals exploit them. Due to this, the need to manage risks has been recogn
November 30, 2018
Pedro Tavares
Management, compliance & auditing
Introduction With the digital transformation of our communication systems and the development of cloud and edge computing, the enterprise perimeter is fuzzie
November 25, 2018
Susan Morrow
Management, compliance & auditing
Introduction The need to maintain safe and secure logistics and supply chain channels is receiving a lot of importance and attention worldwide. Once such leg
October 30, 2018
Ravi Das
Management, compliance & auditing
Introduction In the cyber-threat landscape of today, the hacker is out to get all sorts of information and data and to exploit it for malicious purposes. For
October 29, 2018
Ravi Das
Management, compliance & auditing
Constant changes in the regulatory environment are putting more pressure on organizations to get data security and privacy right. Some regulations require au
October 09, 2018
Rodika Tollefson
Management, compliance & auditing
As the prevalence of digital technologies grows, compliance becomes a more vital part of how organizations do business. Compliance has become a relevant conc
October 09, 2018
Rodika Tollefson
Management, compliance & auditing
Despite the recent mad dash to comply with European Union’s General Data Protection Regulation (GDPR), many organizations missed the May 25 deadline. We all
September 28, 2018
Rodika Tollefson
Management, compliance & auditing
Data privacy suddenly got hot a few years ago when Edward Snowden made his revelations about the NSA snooping on U.S. citizens’ data. Since then, data privac
September 27, 2018
Susan Morrow
Management, compliance & auditing
George Bernard Shaw once said that the U.K. and U.S. were “two nations divided by a common language.” You can say a similar thing about security managers. S
September 27, 2018
Susan MorrowIn this series
- The top security architect interview questions you need to know
- Top 10 cybersecurity best practices: Secure your organization’s data
- Is AI cybersecurity in your policies?
- Federal privacy and cybersecurity enforcement — an overview
- U.S. privacy and cybersecurity laws — an overview
- Common misperceptions about PCI DSS: Let’s dispel a few myths
- How PCI DSS acts as an (informal) insurance policy
- Keeping your team fresh: How to prevent employee burnout
- How foundations of U.S. law apply to information security
- Data protection Pandora's Box: Get privacy right the first time, or else
- Privacy dos and don'ts: Privacy policies and the right to transparency
- Starr McFarland talks privacy: 5 things to know about the new, online IAPP CIPT learning path
- Data protection vs. data privacy: What’s the difference?
- NIST 800-171: 6 things you need to know about this new learning path
- Working as a data privacy consultant: Cleaning up other people’s mess
- 6 ways that U.S. and EU data privacy laws differ
- Navigating local data privacy standards in a global world
- Building your FedRAMP certification and compliance team
- SOC 3 compliance: Everything your organization needs to know
- SOC 2 compliance: Everything your organization needs to know
- SOC 1 compliance: Everything your organization needs to know
- Overview: Understanding SOC compliance: SOC 1 vs. SOC 2 vs. SOC 3
- How to comply with FCPA regulation – 5 Tips
- ISO 27001 framework: What it is and how to comply
- Why data classification is important for security
- Threat Modeling 101: Getting started with application security threat modeling [2021 update]
- VLAN network segmentation and security- chapter five [updated 2021]
- CCPA vs CalOPPA: Which one applies to you and how to ensure data security compliance
- IT auditing and controls – planning the IT audit [updated 2021]
- Finding security defects early in the SDLC with STRIDE threat modeling [updated 2021]
- Cyber threat analysis [updated 2021]
- Rapid threat model prototyping: Introduction and overview
- Commercial off-the-shelf IoT system solutions: A risk assessment
- A school district's guide for Education Law §2-d compliance
- IT auditing and controls: A look at application controls [updated 2021]
- 6 key elements of a threat model
- Top threat modeling frameworks: STRIDE, OWASP Top 10, MITRE ATT&CK framework and more
- Average IT manager salary in 2021
- Security vs. usability: Pros and cons of risk-based authentication
- Threat modeling: Technical walkthrough and tutorial
- Comparing endpoint security: EPP vs. EDR vs. XDR
- Role and purpose of threat modeling in software development
- 5 changes the CPRA makes to the CCPA that you need to know
- 6 benefits of cyber threat modeling
- What is threat modeling?
- First Safe Harbor, then Privacy Shield: What EU-US data-sharing agreement is next?
- How to make cybersecurity budget cuts without sacrificing security
- How to mitigate security risk in international business environments
- Security theatrics or strategy? Optimizing security budget efficiency and effectiveness
- NY SHIELD Act: Security awareness and training requirements for New York businesses