Cybersecurity
More Cybersecurity Articles
Cybersecurity
Data Mapping for Global Privacy Compliance
It has been a year since the Safe Harbor framework was invalidated by the European Court of Justice. That framework allowed U.S. companies that registered with the Federal Trade Commission to legitimately transfer data from EU member countries to the U.S. At the time the Safe Harbor was invalidated...
Read MoreTechnology
The Cyberthreat Within: As companies wake up to insider threats, C-suite executives are looking beyond IT for help
Two of the most insidious myths about cybersecurity are that most threats originate outside an organization – Russian hackers, for example – and that it is an IT problem. Amie Taal, a cybersecurity expert with Deutsche Bank, Jenny Le, who runs operations for e-discovery provider FRONTEO...
Read MoreCybersecurity
After the Data Deluge: “Keep it all, keep it forever” won’t do any longer. As paradigms shift, information governance, including defensible data remediation, takes center stage
Most experts agree that a sound information governance and data remediation program is vital to driving an organization’s business and reducing its risk profile. But how and why and when and with whom are all questions under active consideration. In this interview, Therese Craparo of Reed...
Read More