Comics for Consumer Communication


In some cases, the comic book format has been used as a way to help people get access to critical legal help. This case study from my time as a Publication Manager at the Legal Services Society (LSS) of British Columbia (BC) could inspire the use of comics outside the development process. In this case, the two departments explored different formats, and ultimately chose the comic form.

NSA releases the source code of the GHIDRA reverse engineering framework

Security Affairs

You can download the GHIDRA source code and its component from the following links: Github — source code Download GHIDRA 9.0 — software package, slides, and exercises Installation Guide — basic usage documentation Cheat Sheet — keyboard shortcuts Issue Tracker — report bugs. My colleagues at Cybaze-Yoroi ZLAB malware demonstrated how to use the NSA Ghidra suite in a real case study, the analysis of the AZORult malware.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

CIPL Releases Report on Effective Data Privacy Accountability

Hunton Privacy

The Report also includes 46 case studies from 17 participating organizations from different sectors, geographies and sizes – including two SMEs and a university. The Report also outlines 10 common trends within accountable organizations: Accountable organizations view accountability as a journey and an internal change management process to embed data privacy in the company’s DNA that goes beyond a one-moment-in-time checkbox compliance exercise.

How to become an ISO 27001 lead implementer

IT Governance

You’ll be given a combination of theoretical study and hands-on work, including group discussions, practical exercises and case studies. If you have some knowledge of ISO 27001 and want to further your career, you should consider becoming an ISO 27001 lead implementer.

Risk 61

Can I really rely on my entire workforce to support a recovery?

IT Governance

Clark ( ), editor of January’s book of the month, In Hindsight – A compendium of Business Continuity case studies , which focuses on business continuity and disaster recovery. I would expect other organisations that have been through this type of exercise to have come to a similar conclusion. In my book, In Hindsight: A compendium of Business Continuity case studies , one case study looks at the 2005 Buncefield Oil Depot explosion, which measured 2.4

Risk 49

Destroying Barriers to Destruction


Going through a downsizing exercise at home has heightened my awareness of how difficult it is to let go of items. While there’s a case to be made that more destruction is occurring because of new business demands, I’m not confident that much will have changed in the intervening two years since the last survey. The Guide also includes a number of relevant case studies.

(Discussion Recap) A Perfect Storm? Panel Discussion on Handling a Cybersecurity Incident

HL Chronicle of Data Protection

The incident response plan should be tested in tabletop exercises involving the individuals and teams who would be involved in a real-world incident. Lessons learnt from tabletop exercises and from actual incidents can then be incorporated into the incident response plan. Peter Marta. Arwen Handley. Philip Parish. Nicola Fulford.

How to start your career in cyber security

IT Governance

Study. Books and e-learning courses might be better options, as they allow you to study specific topics at your own pace. This one-day course is delivered by an experienced information security practitioner, and combines formal training, practical exercises and relevant case studies. There has never been a better time to get into cyber security. There is a growing demand for experts , leading to increased salaries and job opportunities.

What Should Be The Core Competencies For Cybersecurity For C-Suite

Cyber Info Veritas

In the case of security professionals, they must be equipped with the necessary bandwidth to increase the alerting threshold and investigate alerts. This exercise should be as practical as possible rather than using a completely theoretical approach.

Understanding the differences between ISO 27001 and ISO 27002

IT Governance

This blog explains why that’s the case, helping you understand how each standard works and the differences between them. You’ll learn from expert information security consultants and have the chance to review case studies and participate in group discussions and practical exercises.

5 best online cyber security training courses and certifications in 2020

IT Governance

To help you on your way, we have made a number of our courses available remotely, enabling you to study from the comfort of your own home and without jeopardising your health. This one-day course is designed and run by real-world practitioners, who help you gain an understanding of risks through practical exercises, group discussions and case studies.

4 ways ISO 27001 can enhance your business

IT Governance

You’ll learn how to implement ISO 27001 in nine steps and have the opportunity to get involved in group discussions, practical exercises and case studies. If your organisation is concerned about information security, it should have an ISO 27001 -compliant information security management system (ISMS) in place. Implementing an ISMS helps organisations manage their security practices, as well as helping to monitor, audit and improve their information security.

Sales 41

EUROPE: New privacy rules for connected vehicles in Europe?

DLA Piper Privacy Matters

These draft guidelines highlight the data protection risks related to such applications, with general recommendations regarding the processing of personal data in relation to the non-professional use of connected vehicles and present some use cases. This would cause the risk that there are insufficient functionalities or options offered to exercise the control necessary for affected individuals to avail themselves of their data protection and privacy rights.

The Power of the Record

Brandeis Records Manager

This may be an exercise in preaching to the RM/IG choir, but here goes…. Each year, we have excellent conferences–ARMA, AIIM, MER–I’ve attended them all multiple times, and they can be counted on for great sessions, engaging vendor floors, insights, leading edge case studies, keynote inspiration, and collegiality. George Despres, CRM. Program Director for University Records Management, Brandeis University.

ICO Consultation on Draft AI Auditing Framework Guidance for Organizations

Hunton Privacy

Part four covers how an organization can facilitate the exercise of individual rights in its AI systems, including rights related to solely automated decision-making. In cases of imbalanced training data, it may be possible to balance the processing by adding or removing data about under/overrepresented subsets of the population ( e.g. , adding more data points on loan applications from women).

Risk 51

The 50% adoption ceiling for Enterprise 2.0


Adoption Council) have released some interesting case studies and field data from large enterprises who have actively embarked on implementing Web 2.0 In essence, the social business phenomenon is real, but all stakeholders vested in the market would be well-advised to exercise some patience in expecting game-changing results.".

Centre Discusses the Risk-Based Approach to Privacy and APEC-EU Interoperability at IAPP Brussels

Hunton Privacy

She also explained the ongoing follow-up work to the Referential, whereby the working group is conducting case studies with the help of several companies that have or are seeking dual certification/approval under the CBPR and BCRs. The purpose of this exercise is to test the usefulness of the Referential and to consider what additional practical tools might be developed to enable companies to leverage compliance with one system into more efficient approval under the other.

Regulatory Update: NAIC Fall 2018 National Meeting

Data Matters

At issue is the applicability of the Supreme Court of Pennsylvania’s decision in the case of Warrantech Consumer Products Services, Inc. Instead, RITF decided to monitor developments in the pending cases and to research the extent to which the Pennsylvania statute at issue in Warrantech differs from similar laws in other states.

Paper 65

APEC Privacy Update – Beijing Meetings

Hunton Privacy

The DPS received a positive outcomes report of a study on the compatibility of Australia’s privacy regime with participation in the CBPR system that may set the stage for Australia’s future participation in the system. Similar studies may be performed on other APEC economies that are considering joining the system.