No Password Required: LIVE From Sunshine Cyber Con
Corruption, Crime and Compliance : Cybersecurity and Compliance: The Growing Partnership of CISOs and CCOs
Episode 282 -- CISO and CCOs -- The Evolving Partnership
Compliance Into The Weeds - HanesBrands Cyber Security Breach Disclosure
Cyberside Chats: Protect Your Crown Jewels – Nobody breaks into a bank to steal the posters
Cyberside Chats: Don’t silo your risk from legal (with Ingrid Rodriguez)
Cyberside Chats: Everyone wants to be Batman. Hacking Back & Cybersecurity Law
No Password Required: The Philosopher CISO of Tallahassee Who Lives to Help Other People
CyberSide Chats: Recap of the White House Cyber Summit (with Amanda Fennell)
Marti Arvin and Anthony Buenger on the CMMC Framework
Learning Objectives: - Gain an understanding of recent changes to the cyber security landscape - Where to start: elevate your cyber security risk management - Educate on the future of cyber security in healthcare and...more
Learning Objectives: - Understand the methods for de-identification - Learn about the differences between anonymization, de-identification, and pseudonymization - Understand what “potential for re-identification”...more
Learning Objectives: - Determine when a Privacy Incident Response Plan is needed - Identify the key steps and roles needed in a Privacy Incident Response Plan - Examine and bridge gaps in your org’s readiness to...more
In today's data-driven world, effectively managing data not only ensures compliance with numerous privacy laws but also enhances operational efficiency and reduces risk. "Building the Case: Get Buy-In to Minimize Data Across...more
Clearly defined roles and responsibilities are an essential component of an effective compliance program. Failure to adequately assign responsibility can lead to gaps in compliance coverage and a lack of accountability. ...more
Currently defense contractors who receive or create Controlled Unclassified Information (“CUI”) from or for the U.S. Department of Defense (“DoD”) are subject to several contract-based cybersecurity requirements, including...more
The House Committee on Energy & Commerce reported out the American Data Privacy and Protection Act (ADPPA) last week and it is now eligible for a full House vote. If passed by Congress and signed by the President, the ADPPA...more
With state legislatures reconvening for 2022, numerous states already have seen California Consumer Privacy Act-like privacy legislation proposed or carried over from 2021, including Ohio, Maryland, Washington, New York and...more
October is cybersecurity awareness month. So, what better time than now to talk about the more detailed proposals emerging from the current administration to strengthen cybersecurity, and how compliance officers and CISOs...more
A ransomware attack is no company’s idea of a good time, but I do sense one positive development emerging from the epidemic of attacks we’ve witnessed this year: Boards and senior management agree that they must move beyond a...more
Over the past few months, there have been numerous developments in U.S. and international privacy law. In the United States, Colorado and Virginia passed consumer privacy laws, and California voters passed a substantial...more
In February 2021, Virginia became the second state – after California – to enact state consumer data privacy legislation – the Virginia Consumer Data Protection Act (CDPA). During this webinar, we will analyze the CDPA. ...more
With state legislatures reconvening for 2021, numerous states already have seen California Consumer Privacy Act-like privacy legislation proposed, including Washington, New York and Minnesota. Other states are expected to...more