article thumbnail

A Practical Guide to Cyber Incident Response

IT Governance

In this interview, I pick her brain on cyber incident response more generally, gaining her expert insight into the ‘what’, ‘how’ and ‘why’, along with practical, real-life examples. For example, not so long ago, LockBit [an infamous ransomware gang] got taken down. Is it normal if someone logs in from a Russian IP address, for example?

Risk 118
article thumbnail

Data Subject Access Requests – High Court dismisses claim where DSAR regime abused

DLA Piper Privacy Matters

However, the Judge held that, even if he were wrong on that primary finding of fact and that there had been a failure to provide a proper request to one or more of the DSARs, the court has a discretion whether or not to make an order and, in this case, there were good reasons for declining to exercise the discretion.

Access 122
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Off to the Races: Comment Period for CPRA Proposed Regulations Begins

Data Matters

They include several real world examples informed by the California Office of the Attorney General’s (OAG) enforcement experiences over the last two years; indeed two of the most senior attorneys in charge of CCPA enforcement at the OAG—Stacey Schesser and Lisa Kim—played a significant role in drafting these regulations. 11 CCR § 7012(e)(6).

Privacy 88
article thumbnail

Avoiding, Managing And Responding To Cyber Incidents

Data Protection Report

Regulated firms remain responsible for any data that they outsource and, in line with this, they must exercise appropriate oversight of any outsourcing – firms may want to consider, for example, what would happen if there was an issue, including whether back-up is adequate and if they would receive appropriate information if something did go wrong.

GDPR 78
article thumbnail

Process Excellence: A transformational lever to extreme automation

IBM Big Data Hub

What do a Canadian energy company, a Dutch coffee retailer and a British multinational consumer packaged goods (CPG) company have in common right now? A Process Mining exercise drawing data from enterprise SAP has helped measure KPI performance and define the transformation roadmap. dollars annually in direct or indirect procurement.

Mining 66
article thumbnail

Application modernization overview

IBM Big Data Hub

Many are addressing this via building accelerators that could be customized for enterprise consumption that helps accelerate specific areas of modernization and one such example from IBM is IBM Consulting Cloud Accelerators. We will explore key areas of acceleration with an example in this article.

Cloud 91
article thumbnail

Does your use of CCTV comply with the GDPR?

IT Governance

You must tell people when you’re collecting their personal information to give them the opportunity to exercise their data subject rights. Vital interests : for example, when processing data will protect someone’s physical integrity or life (either the data subject’s or someone else’s). Make sure people know they’re being recorded.

GDPR 110