Compliance with the European Union's General Data Protection Regulation is no guarantee of compliance with other privacy regulations, says Fatima Khan of Okta, who discusses the challenges.
What's it like to serve in the dual roles of CISO and DPO? Gregory Dumont, who has both responsibilities at SBE Global, a provider of repair and after-sales service solutions to the electronics and telecommunication sectors, explains how the roles differ.
Recently, it was announced that British Airways is to be fined more than £183m by the UK Information Commissioner's Office (ICO) after hackers stole the personal data of half a million of the airline's customers. According to ICO, such data breach, which began in June 2018, occurred because British Airways had "poor...
Incident Response has always been a complex activity, requiring a multi-disciplinary approach to ensure proper handling. Although the issues of privacy and personal data protection are not new to incident handlers, the recent European legislation - General Data Protection Regulation (GDPR) - poses additional...
Data protection officers are assuming a more strategic role that goes beyond ensuring compliance with laws and regulations, including GDPR, says Rob Masson, CEO of the DPO Center.
In today's shifting security and regulatory environment, ongoing third-party monitoring is crucial to compliance success. But how do you keep up with a constantly changing and growing list of vendors?
This session will outline the keys to third-party risk management success through a modern approach to monitoring...
Europe's top court has ruled that Google does not have to remove links to sensitive personal data globally under the EU's "right to be forgotten" requirements, saying the requirement only applies in Europe.
In an exclusive session, veteran CISO Thom Langford looks at what GDPR has influenced since its introduction, how this impacts security and privacy leaders across sectors, and where data protection regulation can go from here.
Langford is the founder of (TL)2 Security, a strategic Information security Consultancy. As...
Foxit Software, the developer of popular PDF and document software, says user accounts were compromised in a breach. The company, which has 560 million users, isn't saying how the breach occurred, how many accounts were affected or for how long.
The realms of data privacy and information security have traditionally been separate in most organizations. However, these domains are increasingly fusing, and in today's digital world, you need them to work in unison.
Many companies leave the question of ownership to their legal department, but today's CIOs are...
The unfortunate reality is that your data security strategy will most likely stall or fail. Unstructured data is getting out of view and control in every organization across verticals. Policy management plays a critical role in the development of data security initiatives, but also requires a coordinated data...
Sweden's Data Protection Authority has issued its first fine for violations of the European Union's General Data Protection regulation after a school launched a facial recognition pilot program to track students' attendance without proper consent.
There are few regulatory environments more complex and challenging than that of a large public utility serving millions of customers across several states. So when the compliance management team at one such organization required a more streamlined approach to gathering, managing, and complying with hundreds of...
As many organizations are working to streamline their governance, risk and compliance (GRC) processes, they often encounter gaps in implementation and need to tailor their tools towards their unique industry and specific goals.
Download this guide which highlights how you can optimize your investment in the popular...
U.S. organizations were barely GDPR compliant in 2018, when California unveiled its own privacy legislation, the California Consumer Privacy Act, which goes into effect on Jan. 1, 2020. Yet, this is but one of several privacy laws being enacted across the U.S., and it poses many questions about the role of security to...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.