Webinar

5 Essential Steps to Meet Your Escalating Duty of Care

A security leader's playbook for protecting against rising penalties & regulations Security leaders: the time is NOW. Meet your duty of care OR face the SEC because what you do to secu ...
January 25, 2023
FAQ

What are the Penalties for Violating the CCPA?

The California Consumer Privacy Act (CCPA) can be an expensive law to break, with several ways that regulators and the public can bring actions seeking financial damages against a company th ...
January 23, 2023
FAQ

Is AWS FedRAMP Certified?

FedRAMP is the short-hand name for the Federal Risk and Authorization Management Program, which the U.S. federal government uses to assess the security of cloud-based vendors and service pro ...
January 18, 2023
FAQ

What is the Statement of Applicability in ISO 27001?

ISO 27001 is a globally recognized standard for organizations to build information security management systems. If your organization wants to achieve ISO 27001 compliance and be certified as ...
January 12, 2023
FAQ

What is Data Governance?

Data governance is the collection of policies and practices that an organization uses to assure that it can use its data assets effectively and efficiently to achieve its business goals. ...
January 10, 2023
FAQ

What is Risk Mitigation?

Risk mitigation is the process a business undertakes to reduce its exposure to the various risks it might face. Obviously businesses face many risks, some of which can cause severe disruptio ...
January 10, 2023
FAQ

What is Third-Party Risk Management?

Third-party risk management (TPRM), also known as "vendor risk management," manages risks introduced to your business by your organization's vendors, suppliers, contractors, and service prov ...
January 5, 2023
FAQ

What is the SOC 2 Common Criteria List?

Protecting privacy and security is foundational for all organizations that process, store, or transmit customer data and personal information. The System and Organization Controls for Ser ...
January 5, 2023
FAQ

What Is the Threshold Application of the CCPA?

When the California Consumer Privacy Act went into effect at the start of 2020, many businesses scrambled to determine whether the law applied to them. The CCPA is the most stringent privacy ...
December 29, 2022
FAQ

What Are the PCI Audit Log Retention Requirements?

Generating an audit trail is integral to compliance with the Payment Card Industry Data Security Standard (PCI DSS), the standard retailers and banks use to protect consumers' credit card in ...
December 27, 2022
FAQ

What are NIST Framework Controls?

The National Institute of Standards and Technology (NIST) Framework Controls are contained in Special Publication 800-53 Security and Privacy Controls for Federal Information Systems and Org ...
December 22, 2022
FAQ

What Does PCI DSS Stand For?

The Payment Card Industry Data Security Standard (PCI DSS) was established by major credit card brands to define security standards that banks and retailers must use to protect the personall ...
December 20, 2022
1 2 3 47