article thumbnail

Think differently about data privacy to deliver digital transformation

Collibra

Although much of the ink spilled around data privacy focuses on obeying regulations such as the EU’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA), it’s a mistake to think about data privacy as a compliance exercise. This is the road to digital transformation.

article thumbnail

MY TAKE: COVID-19 cements the leadership role CISOs must take to secure company networks

The Last Watchdog

Chief Information Security Officers were already on the hot seat well before the COVID-19 global pandemic hit, and they are even more so today. They must rally the troops to proactively engage, day-to-day, in the intricate and absolutely vital mission of preserving the security of IT assets, without stifling innovation.

Security 309
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Work from Home: 7 Best Security Practices for Remote Teams

AIIM

But, as you start your social distancing/remote working, there are certain strict and important practices that every organization will have to exercise. Are you ready to learn the best security practices for remote working that can be used both by organizations and employees for maintaining ethics and productivity? Let’s get started!

Security 134
article thumbnail

Be a part of OpenText World Europe 2024 in Munich

OpenText Information Management

Mark will be joined by OpenText customer Carsten Trapp, CIO of manufacturer Carl Zeiss, who will discuss his company’s partnership with OpenText to support their SAP S/4HANA transformation and compliance initiatives. Wondering what’s new in our products?

IoT 62
article thumbnail

How to prepare for the California Consumer Privacy Act

Thales Cloud Protection & Licensing

Also, entities under the CCPA must post a “Do Not Sell My Personal Information” link on their websites allowing consumers to easily exercise their right of opting-out. (4) 5) The right of Californians to equal service and price, even if they exercise their privacy rights. 4) The right of Californians to access their PI.

Privacy 92
article thumbnail

Data Protection in the Digital Transformation Era

Thales Cloud Protection & Licensing

With more and more organizations embracing digital transformation and accelerating their pace to digitize every piece of information, they become increasingly vulnerable to sophisticated cyber-attacks and data breaches. With the global spend on digital transformation slated to reach a whopping $2.3 To Sum It Up.

article thumbnail

10 measures for good IT security governance

CGI

10 measures for good IT security governance. Too often we see organizations implement technical security safeguards, but fail to implement proper security policies or procedures. As a result, weak practices persist that undermine security and expose assets to significant risk. harini.kottees…. Wed, 02/15/2017 - 01:58.