New privacy laws are popping up state by state, regulation around data privacy continues to expand in the EU and attention on cybercrime is at an all-time high. Coalfire’s Adam Shnider explores what the coming decade may bring. The trend...
Read moreWhistleblower cases may be the next trend in cybersecurity litigation. Morrison & Foerster’s Kristen J. Mathews, Mark David McPherson and Janie Schulman discuss various measures and best practices for companies in guarding against potential liability. While there has (understandably) been...
Read moreWhat does the next major terrorist attack look like? 9/11 spurred an overhaul in security against physical harm, but many organizations are still woefully underprepared for terror’s latest iteration: cyberattacks. Kroll’s Alan Brill and Eric Thompson discuss how organizations can...
Read moreMark Sangster, a cybersecurity expert from eSentire, considers recent data breaches and how the response to them is formulated largely by some key, innate human biases. Mark provides insights on how to reshape security and compliance policies to instead address...
Read moreWith the average cost of a data breach in 2019 as high as $3.9 million, it’s imperative for companies to understand the increasing risks, rising costs and expanding customer turnover rates associated with breaches – and to plan accordingly. Nelson...
Read moreNearly half of companies remain noncompliant as we near the 13th anniversary of the PCI DSS, and these organizations are at serious risk of data breaches and regulatory fines. Ground Labs’ Steven Cavey provides an overview of the standard and...
Read moreNew Template Maps Risks and Presents them to Business Professionals with the Goal of Securing the Organization Against Tangible Threats New York, NY (July 29, 2019) – Cynet today announced The "Security for Management" template, available to cybersecurity professionals to...
Read moreMost organizations’ security and data protection efforts are seriously lacking – particularly when it comes to the human element. Abacus Group’s Jonathan Bohrer outlines three components of a successful cyber compliance program: education, protection and monitoring. Hardware, software, networks and...
Read moreFact is often stranger than fiction. Cybersecurity professionals know that for sure. Abacus Group’s CTO, Paul Ponzeka recommends these books to enlighten, educate and entertain cybersecurity pros and others interested in the topic. Cyber War: The Next Threat to National...
Read moreEvery company should be expecting a security breach at some point. MetricStream’s Vibhav Agarwal discusses the importance of tackling cybersecurity directly and what risk-focused executives must do to avoid disaster and position their organizations for success. In a world where...
Read moreCybersecurity is one of the most daunting responsibilities mutual fund boards must confront, and so few on the board are well-versed in it. ACA Compliance Group’s James Pappas and Askari Foy discuss what’s needed to ensure the board understands the...
Read moreNew data from 1,516 technology asset decision-makers, from organizations employing 1,000 people or more, finds that almost all of them (96 percent) said that hardware and software asset control is a top five priority in their business. However, even though...
Read moreFounded in 2010, CCI is the web’s premier global independent news source for compliance, ethics, risk and information security.
Got a news tip? Get in touch. Want a weekly round-up in your inbox? Sign up for free. No subscription fees, no paywalls.
© 2024 Corporate Compliance Insights
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |