The Role of Identity in GDPR Compliance

When people think of GDPR, they often think of the fines they may face for failing to put proper safeguards in place. In the rush to encrypt data and prepare for breaches, it?s easy to forget to protect the ?front door? where users request access. With… Continue reading The Role of Identity in GDPR Compliance

Hey RSA Archer Summit fans ? Pre-Summit Training Course(s) are Discounted!

RSA Archer Summit and RSA University team up to offer pre-conference training opportunities. From the fundamentals to advanced workflow and navigation, the courses will increase your abilities using the RSA Archer® platform?and all at a discount i… Continue reading Hey RSA Archer Summit fans ? Pre-Summit Training Course(s) are Discounted!

Quantifying Financial Risk Exposure to Cyber Attacks

CISOs are being challenged to put security risk into business terms for many purposes, including investment rationalization and cyber insurance.
The post Quantifying Financial Risk Exposure to Cyber Attacks appeared first on Security Boulevard.
Continue reading Quantifying Financial Risk Exposure to Cyber Attacks

The RSA Archer Business Risk Management Reference Architecture

The RSA® Archer® Business Risk Management Reference Architecture is a high-level visual representation of the framework needed within an organization to understand and manage risk and compliance obligations across the enterprise.
The post The… Continue reading The RSA Archer Business Risk Management Reference Architecture

5 Things We Need from ACL in 2018

Here’s the 5 things I’m hoping will change in 2018 regarding ACL. They are all related to each other and feed off each other… Interesting. One) The ACL Analytics user interface (UI) finds a good plastic surgeon. While I have crit… Continue reading 5 Things We Need from ACL in 2018