article thumbnail

eRecords 2018: “A Case Study in Data Mapping – Are You Ready for a New Norm?”

The Texas Record

IT Security – Cybersecurity; Access Controls; Breach Detection. In addition to the benefits Mr. Kiker provided, data mapping improves communication and data sharing within a local government office/state agency and promotes greater efficiency within your business operations. Plan for IT support and maintenance of data map.

article thumbnail

EUROPE: New privacy rules for connected vehicles in Europe?

DLA Piper Privacy Matters

Main takeaways from the EDBP guidelines are: Connected vehicles raise various privacy and data protection concerns, such as the lack of control and information asymmetry, the risk of excessive data collection; the risk of unlawful further processing of personal data; Most data associated with connected vehicles are considered as personal data (e.g.

Privacy 69
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Top MDR Services for 2021

eSecurity Planet

The third component is the LMNTRIX Cyber Defence Centers made up of a global network of teams of certified cybersecurity experts. With Falcon Complete Team, an expert team of cybersecurity professionals proactively monitor and investigate incidents across all environments. Department of Defense and Intelligence cybersecurity experts.

Cloud 57
article thumbnail

Wednesday LTNY 2020 Sessions: eDiscovery Trends

eDiscovery Daily

There are several interesting sessions today related to eDiscovery, Information Governance, Cybersecurity and Data Privacy. Addressing proactive uses of analytics to prioritize data collection efforts and audit document populations Identify training and monitoring priorities that can ward off impending problems.

article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

VAMOSI: Cybersecurity insurance. I would have had to spend a million of that just on cybersecurity. You know, we're talking about a couple of years old, and like any financial decision, I make the joke that security cybersecurity people were newcomers to this space of financial security. Should you do it, should you not?

article thumbnail

The Hacker Mind Podcast: Hacking Behavioral Biometrics

ForAllSecure

Macorin: My name is Justin Macorin cybersecurity research. My current role is CEO of a cybersecurity firm out of Toronto called Satkhira Secure. And, you know like I have, like, kind of a cool case study that I kind of whipped up when I was in, in healthcare, that would have been applicable there so maybe talk about that later.