Remove Analysis Remove Case Study Remove Government Remove Security
article thumbnail

Looking Back on the Channel Partner Event and Awards 2024

IT Governance

Previously , I had the pleasure of sitting down with Sophie Sayer, our Channel Sales Director, to talk about the IT Governance partner programme and partner event on 9 April 2024. Decisions can be made: By taking shortcuts; or Through thoughtful and detailed analysis. Then you get challenges around behavioural economics.

Sales 59
article thumbnail

15 Top Cybersecurity Certifications for 2022

eSecurity Planet

An IT security certification can provide a key boost for your career, but with so many different certifications available (and so many organizations more than happy to take your money for training and testing), it’s important to make sure that the time and investment are well spent. How to Choose a Security Certification.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to start your career in cyber security

IT Governance

There has never been a better time to get into cyber security, with growing demand for experts promising increased salaries and job opportunities. In this blog, we provide tips for getting your cyber security career started no matter your background. Where can you learn about the cyber security industry?

article thumbnail

Understanding the differences between ISO 27001 and ISO 27002

IT Governance

Anyone with an interest in information security will have encountered ISO 27001 , the international standard that describes best practice for an ISMS (information security management system). It’s a supplementary standard that provides advice on how to implement the security controls listed in Annex A of ISO 27001.

article thumbnail

What is the NIS2 Directive and How Does It Affect You?

Thales Cloud Protection & Licensing

The European Union enacted the Network and Information System (NIS) regulation in July 2016 with the intention of ensuring a specific level of security for networks and information systems belonging to critical and sensitive infrastructures in EU member states. As a result, security in the public and private sectors became fragmented.

IT 71
article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

And this continues to include enterprises that have poured a king’s ransom into hardening their first-party security posture. Shared Management equips its members to lead their organizations – and their organizations’ partners — in mitigating third party IT security risks in several ways. Advancing best practices.

Risk 117
article thumbnail

FTC Releases Report on Facial Recognition Technology

Hunton Privacy

In the report, the FTC illustrates through case studies how companies may implement these principles. In one case study, an eyeglass company enables consumers to upload images to the company’s website and place different eyeglass styles on those images.

Privacy 40