Tips on Securing Endpoints, Ensuring Compliance

Data Breach Today

Matthew Burns of HCL Software discusses securing endpoints and ensuring compliance during exceptional times in an interview following a recent series of virtual roundtables on the subject

Why Compliance Teams Need a Dashboard

Data Breach Today

Compliance Expert Discusses Leveraging Data Analytics Adam Turteltaub, chief engagement and strategy officer at the Society of Corporate Compliance and Ethics, says compliance teams should create a dashboard of data that will help keep track of actions taken by staff members who are working remotel

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Is GDPR Compliance Tougher Than HIPAA Compliance?

Data Breach Today

Analysts: GDPR Case in Portugal Offers Lessons for U.S. Healthcare Entities An EU General Data Protection Regulation enforcement action against a hospital in Portugal demonstrates complying with GDPR may be even tougher than complying with HIPAA. Regulatory experts analyze the implications of the case

Compliance Lessons From 2020 Fraud Cases

Data Breach Today

Panel of Experts Discusses How Technology Can Mitigate Large-Scale Global Fraud What compliance lessons can be learned from major fraud cases in 2020, including the Goldman Sachs bribery case, the Wirecard mass corruption case and the Novartis bribery case?

Best Practices for Modern Records Management and Retention

Speaker: Sean Baird, Director of Product Marketing at Nuxeo

Documents are at the heart of many business processes. Organizations in highly regulated industries are realizing that traditional records management practices are insufficient and ineffective in today’s digital world. Join Sean Baird as he highlights best practices for effective records management and retention. He will explore how digital transformation can counteract the costs, inefficiencies, and end-user considerations that make it difficult to maintain compliance. He will highlight real-world successes and analyze the key strategies and technologies that help organizations find balance.

Addressing Privacy Compliance Challenges

Data Breach Today

Fatima Khan of Okta on Going Beyond GDPR Compliance Compliance with the European Union's General Data Protection Regulation is no guarantee of compliance with other privacy regulations, says Fatima Khan of Okta, who discusses the challenges

GDPR Compliance Used as Phishing Lure

Data Breach Today

The campaign enticed victims with subject lines indicating their email security system was not in compliance with the law, according to Area 1 Security Campaign Designed to Steal Credentials A recently uncovered phishing campaign used the European Union's General Data Protection Regulation as a lure to steal login credentials.

Compliance in a Hybrid Environment

Data Breach Today

Don Closser of Firemon Shares Insights on New Issues in New Era How can organizations deal with compliance issues in a hybrid environment? Don Closser of Firemon discusses compliance in the age of cloud computing

Jeanette Manfra on 'Compliance Without Compromise'

Data Breach Today

Google Cloud Director, Formerly of CISA, Discusses Securing Government's Cloud Transformation Jeanette Manfra served under three presidents as one of the top U.S. government cybersecurity leaders.

Australia's New Infosec Regulation: A Compliance Challenge

Data Breach Today

Here's why compliance with the regulation, CPS 234, is challenging Crunch Time as Deadline Approaches for CPS 234 Health insurers and financial institutions across Australia are in the final stretch of preparing for a cybersecurity regulation that looks to put companies on a strong footing amidst an increasingly hostile hacking environment.

GDPR Compliance: Common Misconceptions

Data Breach Today

Attorney Elizabeth Harding clears up confusion about certain provisions of the EU's General Data Protection Regulation, including the issue of when organizations need to obtain a European consumer's consent to process their data

Simplifying macOS security and compliance

Jamf

Jamf acquires cmdReporter, an auditing and compliance solution that integrates with Jamf Pro and existing security data repositories

Five pressing compliance and risk management priorities for 2021

OpenText Information Management

Recent … The post Five pressing compliance and risk management priorities for 2021 appeared first on OpenText Blogs. Industries privacy Compliance data privacy GDPR CSR CCPA ESG ethical compliance

CCPA Compliance: Identity Verification Challenges

Data Breach Today

One key step for preparing to comply with the California Consumer Privacy Act, which goes into effect in January, is determining how best to verify the identity of users, say two leaders of the Sovrin Foundation, who discuss the key issues

Microsoft Ignite Brings Security & Compliance Updates

Dark Reading

Microsoft announces support for data loss prevention in Google Chrome, co-authoring of protected files, and more at Ignite 2021

PSD2: The Compliance and Enforcement Update

Data Breach Today

But where are financial institutions now re: compliance and enforcement? James Rendell of CA Technologies, a Broadcom company, offers insight on PSD2 and EMV 3DS compliance for 2020 The EU's second Payments Services Directive is alive and well.

Documenting and Managing Governance, Risk and Compliance with Business Process

erwin

Managing an organization’s governance, risk and compliance (GRC) via its enterprise and business architectures means managing them against business processes (BP). Governance, risk and compliance are treated as isolated bubbles.

FAQ: Are We In Compliance?

The Texas Record

If you work for a local government and have interacted with us, there’s a good chance you’ve heard us talk about whether or not you’re “in compliance.” But regardless of the level of fun that can be had in filling out forms, we simply aim to help you understand what it means to be in compliance and how to get there. The responsibility of accepting compliance documents falls to our = Records Management Assistance unit. FAQ Compliance Forms Local Governments

COPPA Compliance

Schneier on Security

Examining COPPA Compliance at Scale ": Abstract: We present a scalable dynamic analysis framework that allows for the automatic evaluation of the privacy behaviors of Android apps. We use our system to analyze mobile apps' compliance with the Children's Online Privacy Protection Act (COPPA), one of the few stringent privacy laws in the U.S. Interesting research: " 'Won't Somebody Think of the Children?'

Narrow the Scope of Compliance

Dark Reading

Many organizations are doing more than they need regarding compliance

Considerations for Seamless CCPA Compliance

Dark Reading

Three steps to better serve consumers, ensure maximum security, and achieve compliance with the California Consumer Privacy Act

Driving GDPR Compliance

Collibra

The GDPR has been in force since May 25, 2018, and several frameworks have appeared to help companies achieve GDPR compliance. . Considering GDPR compliance as a continuous effort towards comprehensive data privacy will make you future-ready for new regulations or added data channels. . A successful GDPR compliance focuses on three key aspects: . Organizations typically have their own challenges in managing data and domain-specific or region-specific compliances.

Initial CCPA Compliance Costs Could Hit $55 Billion: Study

Data Breach Today

Report Estimates Anticipated Expenses for California Consumer Privacy Act Compliance The California Consumer Privacy Act could cost companies in the state a total of $55 billion for initial compliance expenses, according to a new study prepared for the state attorney general's office.

Containers Complicate Compliance (And What To Do About It)

The Security Ledger

If you work within the security industry, compliance is seen almost as a dirty word. Here, we see it’s all too common for organizations to treat testing compliance as a checkbox exercise and to thereby view compliance in a way that goes against its entire purpose.

Regulatory Compliance on the Web: What Your Website Needs

Hanzo Learning Center

Compliance website collection web archive Regulatory Compliance web archivingYour website is an important part of your business. Chances are, you’re investing both time and money to ensure that it attracts customers and satisfies their needs so that they decide to do business with you.

GDPR Compliance: Should CISO Serve as DPO?

Data Breach Today

Sorting Out the Role of the Data Protection Officer As organizations settle into the third year of enforcement of the EU's General Data Protection Regulation, some are struggling to define and understand the role of a data protection officer as required under the regulation - including whether the CISO should take on the extra role of DPO

Is your Organization Suffering From Third-Party "Compliance Drift"?

Data Breach Today

Countermeasures to Keep your Compliance On Track and as Originally Designed Third-party vendors accessing your most critical systems and networks can also bring in security incidents along with all those wonderful things they promised in the sales presentation

Making compliance part of your information governance strategy

OpenText Information Management

Compliance should be a major part of any information governance strategy. Products Compliance BPM Process Management information governance document management File360 Document Centric Workflow Process Improvement

Compliance Training? What Compliance Training?

Dark Reading

Employees can run. but they can't hide. Or can they

How to Achieve Collaboration Tool Compliance

Dark Reading

Organizations must fully understand the regulatory guidance on collaboration security and privacy so they can continue to implement and expand their use of tools such as Zoom and Teams

Banking on Uncertainty - The Future of Financial Crime and Compliance

Data Breach Today

Even before the pandemic set us on the road to a global recession, many banks were struggling to balance the polarising pressures of a changing world and keeping to business as usual

HIPAA Compliance Checklist from Comparitech

IG Guru

This article is a great 101 overview with some extra goodies on how to conduct a HIPAA compliance checklist. The post HIPAA Compliance Checklist from Comparitech appeared first on IG GURU. Business Compliance Education HIPAA IG News Risk News Comparitech

Facebook's Zuckerberg Pledges Worldwide GDPR Compliance

Data Breach Today

Second Congressional Hearing Probes Privacy Issues At a U.S. House hearing Wednesday, Facebook CEO Mark Zuckerberg said the company would eventually comply worldwide with the European Union's tough privacy law, the General Data Protection Regulation

Costco EDI compliance made easy

OpenText Information Management

To be stocked in Costco, all suppliers – … The post Costco EDI compliance made easy appeared first on OpenText Blogs. Technologies Business Network EDI small business EDI Costco EDI Costco EDI specifications CostcoEDI requirements Costco EDI compliance B2B connectivityWhile it’s easy for small business owners to think that digital transformation is primarily an issue for large enterprises, many retailers prefer, or even require, all their suppliers to be EDI savvy.

Third-Party Risk Management: NY DFS Regulation Compliance

Data Breach Today

Ted Augustinos of Locke Lord LLP Addresses the Challenges Defining the scope of third-party risk is challenging, says Ted Augustinos of Locke Lord LLP, who discusses compliance with the New York Department of Financial Services' cybersecurity regulation

GDPR Compliance: The Role of Vendor Risk Management

Data Breach Today

Attorney Steven Teppler on Holding Vendors Accountable Why is ramping up vendor risk management such a critical component of compliance with the EU's General Data Protection Regulation? Attorney Steven Teppler provides insights

Verizon: Companies Failing to Maintain PCI DSS Compliance

Data Breach Today

Many companies around the world that accept card payments are failing to continually maintain compliance with the PCI Data Security Standard, according to the new Verizon 2019 Payment Security Report. Verizon's Rodolphe Simonetti, who contributed to the report, explains the findings

CCPA compliance: A sustainable approach

Collibra

CCPA compliance requirements. For CCPA compliance, PI (Personal Information) is defined as information that identifies, relates to, describes, is reasonably capable of being associated with, or could reasonably be linked, directly or indirectly, with a particular consumer or household.

WORM Compliance at Work

InfoGoTo

Where WORM compliance is critical, companies naturally prefer WORM media so that data can live and remain available for many years without risk to its integrity. WORM compliance is the industry’s best investment in the health and accessibility of its most precious information resources. Vendors create WORM-compliant storage technologies (Write-Once, Read-Many) so that organizations can write (save) data to the media indefinitely.

Compliance: Mississippi State Agencies Have a Long Way to Go

Data Breach Today

Audit Finds Agencies Not Following State's Cybersecurity Law The personal data of Mississippi citizens is susceptible to breaches because many state agencies, universities and other organizations are failing to comply with all the mandates of the state's cybersecurity law, according to a report issued by the Office of the State Auditor