Remove 2014 Remove Events Remove Security Remove Workshop
article thumbnail

IAPP Europe Data Protection Congress 2014

Hunton Privacy

Join us at the International Association of Privacy Professionals (“IAPP”) Data Protection Congress in Brussels, November 18-20, 2014. Hunton & Williams privacy professionals will be featured speakers in the following sessions: Internet of Things, Data Protection and Security: What are the Legal Challenges, and How Do We Overcome Them?

Privacy 40
article thumbnail

NIST Continues to Make Progress on its Privacy Framework

HL Chronicle of Data Protection

On May 13-14, 2019, NIST hosted its second workshop on the recently released discussion draft of its “Privacy Framework: An Enterprise Risk Management Tool” (“Privacy Framework”). The workshop brought together stakeholders to provide feedback on the draft and suggest areas for revision.

Privacy 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind: Hacking Aerospace

ForAllSecure

Vamosi: Maybe you remember this: In 2014, researchers Charlie Miller and Chris Valasek succeeded in hacking a Jeep Cherokee while a reporter was driving it on a freeway during rush hour in St Louis, Missouri. ” The event, which was captured on video and also reported in Wired magazine, sent a message to the automotive industry.

article thumbnail

Proposed Changes to FDA Guidance for the Content of Premarket Submissions for Management of Cybersecurity in Medical Devices: What you Should Know

HL Chronicle of Data Protection

Department of Homeland Security (DHS) earlier this month. When final, the new guidance will supersede the final October 2, 2014 guidance of the same name. Consistent with the U.S. Key updates to FDA’s premarket cybersecurity guidance. On October 18, 2018, FDA issued its revised draft premarket cybersecurity guidance.

article thumbnail

Is India's Aadhaar System Really "Hack-Proof"? Assessing a Publicly Observable Security Posture

Troy Hunt

million records on US consumers (this started a series events which ultimately led to me testifying in front of Congress ), South Africa had data on everyone living in the country (and a bunch of deceased folks as well) leaked by a sloppy real estate agent and data from Australia's Medicare system was being sold to anyone able to come up with $30.

Security 111
article thumbnail

The Hacker Mind Podcast: DEF CON Villages

ForAllSecure

Vamosi: DEF CON turns 30 This year what began simply as a going away party for a coworker has since evolved over the decades into an annual summer tradition for InfoSec leaders in Las Vegas, which now includes other events such as besides Las Vegas, Diana is known as hackers summer camp. DEF CON 18: I'm Robert Vamosi. I'm Robert Vamosi.

article thumbnail

The Hacker Mind Podcast: Learn Competitive Hacking with picoCTF

ForAllSecure

And if you're going for a certification like CISSP Computer Information Systems Security Professional, you'll need to have a breadth of experience across multiple domains. So while you may be particularly skilled in security architecture and engineering. For example, when learning a new subject area. One of the best known starters CTF.