article thumbnail

eRecords 2018: “A Case Study in Data Mapping – Are You Ready for a New Norm?”

The Texas Record

Privacy – Confidential Information; Risk; PCI; PII. Before taking on this project, apply the lessons learned from KPMG case study so you do not encounter the same issues that slowed them down. Legal – eDiscovery; Legal Holds; Consistency. Compliance – Regulatory; Industry Specific; Audits.

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Related: Atrium Health breach highlights third-party risks. Third-party cyber risks are likely to persist at the current scale for a while longer. According to a recent Ponemon Institute study , some 59% of companies experienced a third-party data breach in 2018, yet only 16% believe they are effectively mitigating third-party risk.

Risk 147
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Regulatory Update: NAIC Fall 2018 National Meeting

Data Matters

The National Association of Insurance Commissioners (NAIC) held its Fall 2018 National Meeting (Fall Meeting) in San Francisco, California, from November 15 to 18, 2018. GCC using a risk-based capital aggregation methodology. systemic risk of insurers with other parts of the financial system, notably the banking.

article thumbnail

Sophie Sayer on the IT Governance Partner Programme

IT Governance

We are the market leader in data privacy and cyber security risk management solutions, so it makes sense to partner with us. IT Governance was able to support Tela Technology with those and other clients, and they highly recommend working with us in a video case study. She was also in the PCR’s top 25 Women in Tech in 2018.

article thumbnail

Book reviews: a call to arms for open licensing

CILIP

Nearly all the case studies in the second half of the book are UK-based and most deal with digitisation projects; the two exceptions are the accounts from the British Library (open metadata) and the University of Edinburgh (open educational resources). 26 June 2018. ? ? This book is both accessible and comprehensive.

article thumbnail

Zurich refuses to pay Mondelez for NotPetya damages because it’s ‘an act of war’

Security Affairs

On the other side, Mondelez was requesting the payment of a policy that was promising to conver “ all risks of physical loss or damage ” as well as “ physical loss or damage to electronic data, programs, or software, including loss or damage caused by the malicious introduction of a machine code or instruction.”

article thumbnail

Can I really rely on my entire workforce to support a recovery?

IT Governance

Clark ( www.bcm-consultancy.com ), editor of January’s book of the month, In Hindsight – A compendium of Business Continuity case studies , which focuses on business continuity and disaster recovery. Admittedly, not often and organisational risk assessments are likely to reflect that. This is a guest article written by Robert A.

Risk 75