Remove solutions privacy-program-consulting
article thumbnail

Cyber and Privacy Risks for Real Estate Enterprises

SecureWorld News

Managing cyber, privacy, and technology exposures through insurance can be complex and requires expert attention to detail around some key areas: contractual risk management, insurance coverage negotiation, cyber-physical damage risk, and the constantly expanding universe of regulatory and privacy litigation.

Risk 80
article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

Below is our esteemed panel of SC Awards judges, contributing from health care, engineering, finance, education, manufacturing, nonprofit and consulting, among others. Cedric Leighton is founder and president of Cedric Leighton Associates, a strategic risk and leadership management consultancy. He retired as a colonel in 2010.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Build an insider threat management program that involves everyone

SC Magazine

Today’s columnist, Deborah Watson of Proofpoint, says with so much work conducted via virtual meetings, risk has increased and businesses have to pay more attention to an insider threat management program. Think of Insider Threat Management Programs (ITMPs) as a holistic focus on managing the risks that insiders pose to your corporate assets.

Risk 91
article thumbnail

Thales is part of the Gartner Peer Insights Customer First program for Access Management

Thales Cloud Protection & Licensing

Thales is part of the Gartner Peer Insights Customer First program for Access Management. Our team at Thales takes great pride in this program commitment, as customer feedback continues to be a critical priority, and shapes our products and services. Passwords are more a vulnerability and a threat than a security solution.

article thumbnail

Burners, Dots, and Pluses: Protecting Your Email in the Post-Privacy Age

Adam Levin

Your email address could present the greatest liability when it comes to cybersecurity and privacy. That said, there is a cost: namely privacy. . Privacy-centric options exist, including Protonmail which features end-to-end encryption. There is no one-size-fits-all solution. 1 – Create a Burner Account.

article thumbnail

Operator Tokenomics and Respectful Personal Data Brokering

Security Boulevard

Creating tangible value while complying with privacy regulations can get complicated. Meanwhile, data privacy regulations are upping the ante for gathering consent before using personal data, forcing enterprises to re-architect their customer experience.

article thumbnail

“Future of Vulnerability Management” Podcast Episode 5: How to Bridge the Gap Between Risk Management and Core Business Outcomes

NopSec

Lisa has a passion for connecting business with technology and thrives in transforming disruptive technology into leading solutions. Before LogicWorks, Matt was head of global information security at Crocs and spent more than a decade with cyber consulting firms like Optiv and Coalfire.

Risk 52