Blogs

blog post
Squaring the Schrems II Circle With Geo-Fencing

About the author Scott M. Giordano is an attorney with more than 20 years of legal, technology, and risk management…

Data Management & Governance

blog post
The Transatlantic Digital Divide: How Data Classification Can Ease Data Privacy Tensions, Post-Schrems II

About the author Scott M. Giordano is an attorney with more than 20 years of legal, technology, and risk management…

Data Management & Governance

blog post
Ten Steps to an Effective Data Protection Program

What is a data protection program? Data protection involves securing sensitive data so organizations can use it for business purposes…

Compliance & Regulations Data Breach Data Management & Governance Data Protection Data Security Sensitive Data

blog post
Ensuring Data Privacy While Preserving Data Integrity

Organizations rely on data to make strategic decisions—but if you can’t trust the accuracy and integrity of your data, how…

Data Management & Governance Data Privacy

blog post
How valuable is your data?

About the author From security architecture to data management, Cory Retherford brings 20 years of technical experience to his position…

Data Management & Governance Sensitive Data

blog post
8 Steps Security Leaders Follow to Classify Sensitive Data

Leverage data classification to assign a level of sensitivity to each piece of information within your enterprise.

Data Management & Governance Data Privacy Data Protection Data Security Sensitive Data

blog post
4 Steps to Justify Security Software to the Board

4 steps for CISOs to present budget to Board of Directors

Compliance & Regulations Data Breach Data Management & Governance Data Privacy Data Protection Data Security Sensitive Data

blog post
Cyber Security Assessment Tool [New 2019]

A new tool to provide easy execution of the FFIEC CAT framework [2019]

Compliance & Regulations Data Breach Data Management & Governance Data Privacy Data Protection Data Security Sensitive Data