Remove 12
article thumbnail

Privacy and Cybersecurity June 2018 Events

HL Chronicle of Data Protection

Please join us for our June 2018 Privacy and Cybersecurity Events. breach notification requirements, provide compliance tips and benchmarks, discuss litigation strategies for when an incident occurs, and look ahead at notification requirements under the EU’s Network and Information Systems (NIS) Directive. .”

article thumbnail

Privacy and Cybersecurity October 2018 Events

HL Chronicle of Data Protection

Please join us for our October 2018 Privacy and Cybersecurity Events. October 11-12. This discussion will be hosted at the Hogan Lovells Silicon Valley office on October 11 the Los Angeles office on October 12. Location : Silicon Valley – October 11 and Los Angeles – October 12. October 11. October 26.

Privacy 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Three Strategies for Big Data Security

Thales Cloud Protection & Licensing

The 2018 Thales Data Threat Report (DTR) has great information on Big Data use and security. These are great tactics, but I’d like to discuss the three most common overarching strategies I see in Big Data security today. Strategies for Securing Big Data. Top Big Data Security Concerns. But they rightly have concerns.

article thumbnail

The DSP Toolkit – why can’t you register?

IT Governance

As most health and social care organisations will be aware, the Data Security and Protection (DSP) Toolkit replaced the Information Governance (IG) Toolkit from April 2018 as the compliance standard for any organisation looking to access NHS networks. 25–26 April 2018, NEC Birmingham. What can you do now to comply? Find us at stand #3.

article thumbnail

ILTACON 2018 Has Begun!: eDiscovery Trends

eDiscovery Daily

The International Legal Technology Association (ILTA) annual educational conference of 2018 (known as ILTACON) kicked off yesterday with several networking events, and begins in earnest today with the first day of sessions. We will also discuss eDiscovery best practices, training strategies, and defining work processes.

article thumbnail

Cyber Insurers Pull Back Amid Increase in Cyber Attacks, Costs

eSecurity Planet

Cyber insurance premiums have jumped about 12 percent between the beginning of 2018 and the end of 2020. There is a major difference between not covering ransomware events and not covering the cost of ransom.

Insurance 127
article thumbnail

PCI DSS policies address the weakest link – people

IT Governance

Verizon’s 2018 Data Breach Investigations Report identified that almost 1 in 5 data breaches (17%) were the result of human error. These policies and procedures can then serve as a guide, following the 12 requirements of the PCI DSS, from which you and your QSA (Qualified Security Assessor) can work during your assessment.