Top 2019 Cybersecurity Predictions From the Resilient Year-End Webinar

During the recent IBM Resilient year-end webinar, expert panelists discussed and debated the trends that defined 2018 and offered cybersecurity predictions on what the industry can expect in 2019.

The post Top 2019 Cybersecurity Predictions From the Resilient Year-End Webinar appeared first on Security Intelligence.

Continue reading Top 2019 Cybersecurity Predictions From the Resilient Year-End Webinar

A New Privacy Frontier: Protect Your Organization’s Gold With These 5 Data Risk Management Tips

The enactment of recent privacy mandates is just the start. A comprehensive data risk management program established before more regulations go into effect is well worth its weight in gold.

The post A New Privacy Frontier: Protect Your Organization’s Gold With These 5 Data Risk Management Tips appeared first on Security Intelligence.

Continue reading A New Privacy Frontier: Protect Your Organization’s Gold With These 5 Data Risk Management Tips

Understanding California’s Consumer Privacy Act: The ‘American GDPR’

Most companies still are not fully up to speed on GDPR compliance. Starting in 2020, they’ll have a whole new regulatory maze to navigate: California’s Consumer Privacy Act.

The post Understanding California’s Consumer Privacy Act: The ‘American GDPR’ appeared first on Security Intelligence.

Continue reading Understanding California’s Consumer Privacy Act: The ‘American GDPR’

Legal AI: How Machine Learning is Aiding — and Concerning — Law Practitioners

Law firms tasked with analyzing mounds of data can vastly improve their efficiency by using legal AI tools.

The post Legal AI: How Machine Learning is Aiding — and Concerning — Law Practitioners appeared first on Security Intelligence.

Continue reading Legal AI: How Machine Learning is Aiding — and Concerning — Law Practitioners

Incident Response Under GDPR: What to Do Before, During and After a Data Breach

With GDPR in full swing, organizations need to prepare their incident response plans to move swiftly in the event of a breach and meet the mandated 72-hour incident disclosure window.

The post Incident Response Under GDPR: What to Do Before, During and After a Data Breach appeared first on Security Intelligence.

Continue reading Incident Response Under GDPR: What to Do Before, During and After a Data Breach

How to Navigate Business Ethics in a Data-Hungry Digital World

Data monetization and the digital transformation have forced organizations to navigate the new world of business ethics and security practices.

The post How to Navigate Business Ethics in a Data-Hungry Digital World appeared first on Security Intelligence.

Continue reading How to Navigate Business Ethics in a Data-Hungry Digital World

What Is Transparency’s Role in Establishing Digital Trust With Consumers?

Transparency is a critical factor for consumers when establishing digital trust with companies and service providers due to increasing concerns about data privacy.

The post What Is Transparency’s Role in Establishing Digital Trust With Consumers? appeared first on Security Intelligence.

Continue reading What Is Transparency’s Role in Establishing Digital Trust With Consumers?