DPO200 in association with GDPR Institut

The DPO 200 in association with GDPR Institut recognises and celebrates those individuals who have made significant contributions to the privacy and security sectors. Our editorial team considered several factors in compiling this list, including; social media impact, knowledge sharing and community support. The Data Protection sector has seen a ‘sea change’ of regulatory and [...]

Io-Tahoe: 6 steps – Getting Ready for CCPA

Within the past few years, there has been growing concern about the need to manage and protect an individual’s personal data. Whether you are considering the European Union’s General Data Protection Regulation (GDPR) (which became effective at the end of May 2018), massive data breaches, or a reaction to companies that seek to monetize personal […]

Onetrust: Privacy Governance Framework – The Building Blocks of a Comprehensive Privacy Program

Considering the global digital economy we now live in and the unprecedented technological advancements that keep being made, navigating and understanding privacy laws for companies globally can easily become daunting, and requires, at a minimum, a solid foundational program to rely on. This whitepaper will take you through OneTrust’s research and its ten privacy principles, […]

Protiviti: 2019 Vendor Risk Management Survey

This is the fifth year that the Shared Assessments Programme and Protiviti have partnered in researching the maturity of Vendor Risk Management (VRM) programmes. The research, which looks at organisations’ maturity of vendor risk management, provides helpful benchmarks to evaluate third party risk management programmes against a comprehensive set of best practises. To read the […]

Trustwave: 7 Experts on Database Security

Organisations are challenged with protecting their databases from the rapidly growing number of attacks while demonstrating compliance with stringent security and privacy regulations. In this Mighty Guide, security leaders share best practices on how their organisations have successfully protected their data stores in today’s formidable threat environment. To read the full Ebook, click here