Remove Definition Remove Examples Remove Healthcare Remove Training
article thumbnail

European Commission proposes reinforcement of EU Cybersecurity rules

DLA Piper Privacy Matters

That list corresponds to the list of OES under the NIS Directive, supplemented with the following entities: additional entities in the energy sector , adding for example district heating and cooling and operators of hydrogen production, storage and transmission. Cybersecurity risk management and reporting obligations.

article thumbnail

Regulatory Update: NAIC Summer 2021 National Meeting

Data Matters

Over the past year, more than 100 separate bills regulating PBMs have been introduced in 42 states following the December 10, 2020, unanimous decision by the Supreme Court in Rutledge vs. Pharmaceutical Care Management Association that backed an Arkansas state law that regulates PBMs and paved the way for state regulation of PBMs.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Hacking Behavioral Biometrics

ForAllSecure

Take for example, that German candy, Gummy Bears. Vamosi: What Iain’s talking about is that when you step up to an ATM, for example, the bank can … Paterson: But by and large, Justin really nailed it and biometric really is the human side of it. For example, what of us is measurable by a machine?

article thumbnail

How To Solve The Cybersecurity Skills Shortage

Cyber Info Veritas

Solving and closing the gap for the cybersecurity skills shortage can’t be achieved with the traditional education and formation of employees by creating a curriculum in a college, training a person on how to “do” or “work” in cybersecurity, submitting an application for a cybersecurity job, then hiring the selected candidate to fill the position.

article thumbnail

Regulatory Update: NAIC Summer 2020 National Meeting

Data Matters

The current draft of the FAQ document addresses topics such as general background, the intersection of state insurance regulation and federal securities law regulation, how to satisfy the best interest standard of conduct, and insurer supervision and training requirements.

article thumbnail

Anonymization & Pseudonymization as Tools for Cross-Border Discovery Compliance

ARMA International

For example, mass pseudonymization or anonymization of records prior to any reviews or cross-border transfers can be a part of the solution. For example, every instance of “Susan Brown” in a document can be changed to the pseudonym “Kathy Williams,” and every instance of “Frank Jones” can be changed to the pseudonym “John Doe.”

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. Kim Zetter’s book, Countdown to Zero Day, is perhaps the definitive book on the subject. So your pharmaceutical plants have clean rooms.