What happens when a malware infection results in permanent loss of data, operational downtime and significant reputational damage? Experience the cyber resilience failures of airline CIO Martin Kinsley.
Follow along with risk and compliance officer Frank Roth as he endeavors to fill in the gaps of an outdated (and incomplete) risk management framework in his new role at a utility company.
Follow the decision-making process of IT director Shira Sutton as she endeavors to avoid security risks and unnecessary business continuity headaches on the journey to cloud transformation.
To remain General Data Protection Regulation (GDPR) compliant, you will need to make sure the right people have the right access. Explore the implications of GDPR on insider threat controls.
The first step toward achieving GDPR readiness is to locate your sensitive assets and identify weaknesses in your data security infrastructure. After all, you can't protect what you don't know.
A managed cloud access security broker (CASB) can help organizations gain visibility into shadow IT by monitoring all data transferred between the cloud and on-premises infrastructure.
Organizations preparing for GDPR should reach out to their third-party vendors to clearly define the roles, expectations and responsibilities of data controllers and processors.
Although connected devices make our daily lives easier, IoT data, if not properly secured, can cause serious financial and reputational damage to companies deploying and manufacturing this technology.
New data breach statistics revealed that while total numbers are down, disclosure times are still too high to comply with upcoming data privacy regulations.
With GDPR coming into effect on May 25, the cost of a data breach is about to skyrocket. A comprehensive, regularly updated CSIRP can help IR teams contain the damage associated with a breach.