Remove 2012 Remove Exercises Remove Government Remove Privacy
article thumbnail

Our Data Governance Is Broken. Let’s Reinvent It.

John Battelle's Searchblog

My current work is split between two projects: One has to do with data governance, the other political media. And second… Governance. Government – well for sure, I’d wager that’s increased given who’s been running the country these past two years. But Governance? Data Governance. We’ll start with Governance.

article thumbnail

MY TAKE: Michigan’s cybersecurity readiness initiatives provide roadmap others should follow

The Last Watchdog

Related: California’s pioneering privacy law ripples through other states. The first Cyber Range training and testing hub opened at Eastern Michigan University in late 2012. Participants competed in exercises to detect improvised explosive devises targeting semi-trucks and military vehicles. But it does fit like a glove.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: COVID-19’s silver lining could turn out to be more rapid, wide adoption of cyber hygiene

The Last Watchdog

Related: How the Middle East has advanced mobile security regulations Over the past couple of decades, meaningful initiatives to improve online privacy and security, for both companies and consumers, incrementally gained traction in the tech sector and among key regulatory agencies across Europe, the Middle East and North America.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

With the proliferation of social media platforms and other new technologies has come a renewed legal focus on privacy. Could a party, for instance, decline to produce, review, or even collect certain types of data due to privacy concerns? But what about other contexts? In this essay, Robert D.

Privacy 95
article thumbnail

A Close Up Look at the Consumer Data Broker Radaris

Krebs on Security

government. In 2012, the main company in charge of providing those calling services — Wellesley Hills, Mass-based Unipoint Technology Inc. government. government levied financial sanctions against Channel One that bar US companies or citizens from doing business with the company. government. A Sherborn, Mass.

Privacy 256
article thumbnail

How to prioritize your resources from a risk management perspective

CGI

As published in the new CGI-Governing Institute “Guide to Cybersecurity as Risk Management ,” too often, a compliance-based approach to cybersecurity planning is unable to evolve with a public or private organization’s changing needs. How to prioritize your resources from a risk management perspective. Thu, 10/08/2015 - 08:00.

Risk 40
article thumbnail

Draft Cybersecurity Law Published for Comment in China

Hunton Privacy

The draft contains, however, a number of provisions that are significant, insofar as they reveal underlying assumptions and priorities that govern the development and promotion of cybersecurity in China. At this point, the Draft Cybersecurity Law has not yet been finalized.