article thumbnail

What is COBIT? A framework for alignment and governance

CIO

Later, in the 2000s, the ISACA developed version 3, which brought in the IT management and information governance techniques found in the framework today. These updates included more information regarding governance surrounding information and communication technology.

article thumbnail

Strac plugs into Slack, OneDrive and more to automatically redact sensitive info

TechCrunch

states are passing privacy and security laws aimed at protecting people’s data. The California Consumer Privacy Act is perhaps the best known, followed by the Illinois Biometric Information Privacy Act, the New York Privacy Act and the Virginia Consumer Data Protection Act. Increasingly, absent a federal framework, U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Achieving sustainable PCI security excellence

CIO

Organizations face persistent challenges in achieving, and more importantly, sustaining Payment Card Industry Data Security Standard (PCI DSS) compliance. It helps them overcome stagnation and frustration tied to sustainable compliance efforts. Goldratt says we should change our thinking to solve system issues.

article thumbnail

Book Review: “No Place to Hide”

Palo Alto Networks

Cybersecurity Canon Book Review: “No Place to Hide: Edward Snowden, the NSA, and the U.S. Bottom Line: I recommend this book for the Cybersecurity Canon Hall of Fame. Edward Snowden was not a bystander who happened to stumble upon this information. The Cybersecurity Canon is a real thing for our community.

article thumbnail

Telecom Network Analytics: Transformation, Innovation, Automation

Cloudera

The Dawn of Telco Big Data: 2007-2012. Similarly, some sensitive data should be retained on-prem, and other data should be routed to a particularly secure cloud. Issues of liability, compliance and consistency demand significantly enhanced governance, and a capacity to manage costs which are significant, and growing. Learn more!

article thumbnail

How to deal with cyber-attacks: publicly or privately?

Strategy Driven

Varied though the threat may be, and staggering though these numbers are, the word disclosed highlights a central paradox: While transparency contributes to the overall fortification of cyber-security protocols and procedures, battening down the hatches presumably mitigates further financial risk.

How To 29
article thumbnail

Back to the Financial Regulatory Future

Cloudera

It’s hard to believe it’s been 15 years since the global financial crisis of 2007/2008. There will inevitably be another global financial crisis, but robust data capabilities allow institutions globally to better adapt to regulations, implement compliance strategies, and predict risk.