Incident Response Under GDPR: What to Do Before, During and After a Data Breach

With GDPR in full swing, organizations need to prepare their incident response plans to move swiftly in the event of a breach and meet the mandated 72-hour incident disclosure window.

The post Incident Response Under GDPR: What to Do Before, During and After a Data Breach appeared first on Security Intelligence.

Continue reading Incident Response Under GDPR: What to Do Before, During and After a Data Breach

How Multifactor Authentication Can Help U.S. Government Contractors Achieve DFARS Compliance

The U.S. government’s Defense Federal Acquisition Regulation Supplement (DFARS) aims to help the DOD protect its own data and that of its business partners through multifactor authentication (MFA).

The post How Multifactor Authentication Can Help U.S. Government Contractors Achieve DFARS Compliance appeared first on Security Intelligence.

Continue reading How Multifactor Authentication Can Help U.S. Government Contractors Achieve DFARS Compliance

The GDPR Evolution: A Letter to the CISO

To keep GDPR compliance efforts on track, security leaders must collaborate across departments, invest in robust tools and services and adopt a risk-based approach to handling customer data.

The post The GDPR Evolution: A Letter to the CISO appeared first on Security Intelligence.

Continue reading The GDPR Evolution: A Letter to the CISO

72 Hours: How a Data Breach Response Plan Can Help You Meet the GDPR Notification Deadline

Without a data breach response plan, companies will find it difficult to disclose security incidents within 72 hours as required by the General Data Protection Regulation (GDPR).

The post 72 Hours: How a Data Breach Response Plan Can Help You Meet the GDPR Notification Deadline appeared first on Security Intelligence.

Continue reading 72 Hours: How a Data Breach Response Plan Can Help You Meet the GDPR Notification Deadline

What’s Holding Back GDPR Compliance Efforts?

Organizations can fast-track their GDPR compliance efforts by focusing on three crucial areas: awareness and understanding; accountability and responsibility; and resources and support.

The post What’s Holding Back GDPR Compliance Efforts? appeared first on Security Intelligence.

Continue reading What’s Holding Back GDPR Compliance Efforts?

Why Network Visibility Is Critical for Today’s Compliance Mandates

Without network visibility, organizations run the risk of mishandling customers’ personal data and running afoul of new compliance mandates.

The post Why Network Visibility Is Critical for Today’s Compliance Mandates appeared first on Security Intelligence.

Continue reading Why Network Visibility Is Critical for Today’s Compliance Mandates

How Cloud Security Can Drive Innovation and Transform Your Business

At the May 2018 IBM Security Summit in London, industry experts discussed how organizations could transform their business by developing a formal strategy for cloud security.

The post How Cloud Security Can Drive Innovation and Transform Your Business appeared first on Security Intelligence.

Continue reading How Cloud Security Can Drive Innovation and Transform Your Business

The Compliance Crisis: A Compliance Officer Faces an Outdated Risk Management Framework

Follow along with risk and compliance officer Frank Roth as he endeavors to fill in the gaps of an outdated (and incomplete) risk management framework in his new role at a utility company.

The post The Compliance Crisis: A Compliance Officer Faces an Outdated Risk Management Framework appeared first on Security Intelligence.

Continue reading The Compliance Crisis: A Compliance Officer Faces an Outdated Risk Management Framework

Insider Threat Controls: What Are the GDPR Implications?

To remain General Data Protection Regulation (GDPR) compliant, you will need to make sure the right people have the right access. Explore the implications of GDPR on insider threat controls.

The post Insider Threat Controls: What Are the GDPR Implications? appeared first on Security Intelligence.

Continue reading Insider Threat Controls: What Are the GDPR Implications?

Data Security and GDPR: You Can’t Protect What You Don’t Know

The first step toward achieving GDPR readiness is to locate your sensitive assets and identify weaknesses in your data security infrastructure. After all, you can’t protect what you don’t know.

The post Data Security and GDPR: You Can’t Protect What You Don’t Know appeared first on Security Intelligence.

Continue reading Data Security and GDPR: You Can’t Protect What You Don’t Know