article thumbnail

Successful Information Governance when the Bosses Just Don't Care

AIIM

Risk and Compliance - In the age of GDPR , where every week brings another data breach, organizations have a duty to their customers to safeguard information, especially personal data, and to be able to demonstrate their effective handling of information. FREE How-To Guide from AIIM: Information Governance 101].

article thumbnail

5 best online cyber security training courses and certifications in 2020

IT Governance

This one-day course is designed and run by real-world practitioners, who help you gain an understanding of risks through practical exercises, group discussions and case studies. Certified GDPR Foundation Training Course. See also: What are the best qualifications for a career in cyber security?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

According to a recent Ponemon Institute study , some 59% of companies experienced a third-party data breach in 2018, yet only 16% believe they are effectively mitigating third-party risk. There is impetus for change – beyond the fear of sustaining a major data breach. Advancing best practices.

Risk 117
article thumbnail

Thursday LTNY 2019 Sessions: eDiscovery Trends

eDiscovery Daily

With the advent of technology platforms that allow for indexing of documents/data, including Microsoft O365, developing processes around the technology will be transformative for the management of information. Hear lessons learned and case studies on: (i) the record classification of 1.5 Having been called the U.S.

article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

This framework guarantees that appropriate authentication measures, encryption techniques, data retention policies, and backup procedures are in place. Common threats include misconfigurations, cross-site scripting attacks, and data breaches. Security breaches have a lower impact when they are detected and responded to on time.

article thumbnail

Welcome to Relativity Fest 2019!: eDiscovery Trends

eDiscovery Daily

Parties must evaluate the threat, vulnerability, and consequence of the exploitation of data as a result of foreign control. This session will provide practical tips and case studies from leading regulatory experts who operate in increasingly complex trade and security jurisdictions. But what about “Little Data”?

article thumbnail

Top MDR Services for 2021

eSecurity Planet

Its audit-ready compliance capabilities ensure that an organization’s security meets key standards for compliance frameworks , including Payment Card Industry Data Security Standard (PCI DSS), Health Insurance Portability and Accountability Act (HIPAA), General Data Protection Regulation (GDPR) and HITRUST.

Cloud 57