One place for you to find all you may need
In episode two of our General Data Protection Regulation (GDPR) mini-webinar series we discussed the collection of personal information and how it is guided by the six core principles.at.
Crowd Sourced PDF contains a number of checklists including:
Checklists covering various topics including
A free GDPR preparation kit containing items such as:
This mind map, taken from our GCHQ-Certified Cyber Incident Planning and
A CISSP resource and study aid to help you keep track of domains. An essential resources for all CISSP aspirants.
Download your copy today.
In episode five of our General Data Protection Regulation (GDPR) mini-webinar
In episode six of our General Data Protection Regulation (GDPR) mini-webinar series we discuss the roles and responsibilities of the Data Protection Officer.
In episode seven of our General Data Protection Regulation (GDPR) mini-webinar series we discussed the process of incident response in the event of a regulatory breach.
Most vendors, with a dedicated perseverance, focus solely on features and buzz words to attract attention. This report has researched and analyzed prominent providers of Privileged Access Management (PAM) solutions based on select criteria and discussions with customers and product distributors.
Have your say and share your experience and expertise in this highly interactive incident response workshop, titled Cyber Incident Planning & Response or CIPR. The CIPR workshop will deconstruct the prevailing approach to planning, incident response and the wider field of incident management and identify where and how you can improve and build a more resilient business. This is your chance to get involved and learn from your peers and contribute your own thoughts and opinions in this highly interactive workshop.
If you reckon that users are the first line of defence against ransomware,you are WRONG! We are all humans and we make mistakes and ransomware creators know that. Learn what you can do to protect your business.
Learn how to:
* How to design play-books (aka run-books) for different attack scenarios.
* How to align your incident response to official standards.
* Learn more about a day in the life of an investigator.
* How to create an effective triage process that works for every type of attack.
* Discover the various types of data enrichment attributes to apply to every incident.