article thumbnail

Spotlight Podcast: Rethinking Your Third Party Cyber Risk Strategy

The Security Ledger

Third party cyber risk is growing. In this Spotlight Podcast, a companion to our new eBook, Rethinking Third Party Cyber Risk Management, we go deep on the topic of building a mature third party cyber risk program with Dave Stapleton the Director of Assessment. » Related Stories Third Party Cyber Risk is growing.

Risk 40
article thumbnail

Proactively Protecting Your Sensitive Information for Remote Workers

AIIM

Don’t, however, lose sight of the fact that information scattered across a dispersed workforce can significantly raise the risk of a data breach or other security concerns. At Gimmal, we regularly talk to IT, security, and privacy professionals across a broad portfolio of industries.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Evolving Legislative and Compliance Landscape: A Roadmap for Business Leaders

Thales Cloud Protection & Licensing

NIS2 (Network and Information Security Directive) The updated NIS Directive significantly expands the scope and rigor of cybersecurity requirements across the European Union. It mandates rigorous ICT risk management, including the risks related to ICT third parties, continuous security testing, and comprehensive incident reporting.

article thumbnail

Take Action on Data Privacy Day

AIIM

Webinar: Join us on January 16th (replay available for download after live date) for a free webinar on data security: Top Tips to Bridge the Gap Between Security Awareness and Security Action. eBook: Get an executive guide to managing your information risk: Bridging the Gap Between Security Awareness and Action.

article thumbnail

Bridging the Gap Between Security Awareness and Action

AIIM

75% of organizations see information chaos as a major problem for their organization. In a digital world, Information-related risk runs throughout most organizations. Information security is at the list of concerns (80% are “concerned” or “extremely concerned”).

article thumbnail

Free Expert Insights

IT Governance

Here are all our Q&As to date, grouped by broad topic: AI Cyber attacks and data breaches Cyber Essentials Cyber resilience Cyber security Data privacy DORA Incident response ISO 27001 PCI DSS PECR Security testing Training Miscellaneous To get new expert insights straight to your inbox, sign up to our weekly newsletter, the Security Spotlight.

article thumbnail

Navigating the EU-US Data Protection Framework

Thales Cloud Protection & Licensing

As stated by the International Association of Privacy Professional ( IAPP ) critical sectors such as financial services are therefore conspicuously excluded, leaving organizations without a clear pathway to data protection compliance and potentially exposing them to significant risks.