Establishing Trust and Control in the Age of Data Privacy Regulation

One of the most important components of data privacy and security is being compliant with the regulations that call for the protection of information. Regulators want to see transparency and controllability within organizations, because that is what makes them trustworthy from a data privacy and security standpoint. Ideally, organizations will deploy systems that provide compelling evidence…

Managing an Increasingly Risk-Averse Regulatory Environment

Risk management and mitigation is a high priority for CEOs and other senior executives worldwide — including CIOs and cybersecurity executives. The fact is, it’s impossible to separate risk from technology implementations and the potential cybersecurity vulnerabilities they present. One of the biggest challenges of risk management, as it relates to IT, is the emergence of a…

Add brand security to your workload

Last month in this column, I wrote about how businesses need to “lock up the front door” to their systems to prevent phishing attacks and take a multi-tiered approach to rethinking the identity of their employees, partners, and customers. And while we have been banging this drum for quite some time, a new villain has…