article thumbnail

Compliance Lessons From 2020 Fraud Cases

Data Breach Today

Panel of Experts Discusses How Technology Can Mitigate Large-Scale Global Fraud What compliance lessons can be learned from major fraud cases in 2020, including the Goldman Sachs bribery case, the Wirecard mass corruption case and the Novartis bribery case? A panel of experts offers in-depth analysis.

article thumbnail

BigID Raises $60M, Eyes M&A Around Data Security, Compliance

Data Breach Today

Data Security Vendor Retains Unicorn Status With Riverwood Capital-Led Growth Round A data security firm led by a former CA Technologies executive raised $60 million to boost both organic and inorganic expansion around data and compliance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GDPR Compliance Used as Phishing Lure

Data Breach Today

The campaign enticed victims with subject lines indicating their email security system was not in compliance with the law, according to Area 1 Security. Campaign Designed to Steal Credentials A recently uncovered phishing campaign used the European Union's General Data Protection Regulation as a lure to steal login credentials.

article thumbnail

Tips on Securing Endpoints, Ensuring Compliance

Data Breach Today

Matthew Burns of HCL Software discusses securing endpoints and ensuring compliance during exceptional times in an interview following a recent series of virtual roundtables on the subject.

article thumbnail

Solving Open Source Complexity with a Managed Data Infrastructure Platform

But as the growth in open source adoption increases, so does the complexity of your data infrastructure.

article thumbnail

New Regulations Pose Compliance Challenges

Data Breach Today

How to Navigate New SEC Rules The new SEC rules, which took effect in late 2023, introduce mandatory cyber-incident reporting requirements for all U.S.-listed listed companies.

article thumbnail

GUEST ESSAY: The wisdom of taking a risk-based approach to security compliance

The Last Watchdog

With estimates suggesting there are currently over 15 billion user credentials scattered across the dark web, the importance of compliance is clear to see. In spite of this, many organizations today still see compliance as a nuisance, rather than a business enabler. Strategizing compliance. Take a risk-based approach.

article thumbnail

Everything You Need to Know About Crypto

Speaker: Ryan McInerny, CAMS, FRM, MSBA - Principal, Product Strategy

With 20% of Americans owning cryptocurrencies, speaking "fluent crypto" in the financial sector ensures you are prepared to discuss growth and risk management strategies when the topic arises.

article thumbnail

From Complexity to Clarity: Strategies for Effective Compliance and Security Measures

Speaker: Erika R. Bales, Esq.

When we talk about “compliance and security," most companies want to ensure that steps are being taken to protect what they value most – people, data, real or personal property, intellectual property, digital assets, or any other number of other things - and it’s more important than ever that safeguards are in place. Bales, Esq.

article thumbnail

The Importance of PCI Compliance and Data Ownership When Issuing Payment Cards

This eBook provides a practical explanation of the different PCI compliance approaches that payment card issuers can adopt, as well as the importance of both protecting user PII and gaining ownership and portability of their sensitive data.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Attendees will gain actionable insights on how to manage the complexities of privacy, compliance, and governance in AI-driven environments.

article thumbnail

Beware of Pixels & Trackers on U.S. Healthcare Websites

This report offers insights for cybersecurity, compliance, and privacy executives at healthcare organizations, as well as for policymakers and auditors.

article thumbnail

Outrun Your Competition: Best Practices for Accelerating Sales Processes

Slow-moving compliance reviews. Longer sales cycles. Larger buying committees. Every go-to-market team knows the frustrations that come from a drawn-out sales process. How can you speed it up? By building a modern GTM motion that uses data, automation, and proven best practices to unlock insights, engage customers, and win faster.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

The Unexpected Cost of Data Copies

Unfortunately, data replication, transformation, and movement can result in longer time to insight, reduced efficiency, elevated costs, and increased security and compliance risk.