REGISTER

email 14 48

ONETRUSTTN default View

With the EU General Data Protection Regulation right around the corner, you have probably heard that there will be six legal bases for processing personal data – consent, performance of a contract, compliance with a legal obligation, vital interests, public interest or official authority, and legitimate interests.

AlienVaultTN pdf Download (480 KB)

Privacy of personal information has always been seen as a fundamental right by the citizens of the European Union (EU). However, this right is one that is constantly challenged by ongoing technological developments and international business practices, particularly with more personal information being stored and transmitted electronically. In response, the EU passed the General Data Protection Regulation (GDPR), which was adopted on April 27, 2016, and will become enforceable on May 25, 2018.

absoluteTN default View

Absolute is the safety net that allows organizations to freeze the endpoint to stem any damage and then remediate and return the endpoint to productivity.

ONETRUSTTN pdf Download (568 KB)

Automate GDPR record keeping.

BarracudaTN pdf Download (2.09 MB)

Phishing and ransomware are serious problems that can steal or disable access to corporate or personal finances, sensitive employee data, patient data, intellectual property, employee files and other valuable content.

QualysTN default Download

As CISOs scramble to protect IT infrastructures whose boundaries are increasingly fluid due to the adoption of mobility, cloud computing, IoT and other new technologies, the Qualys Guide to Automating CIS 20 Critical Security Controls provides a helpful in-depth assessment and validation of all controls and related technologies to ensure that they are in place, properly configured, and free from vulnerabilities.

Mimecast pdf Download (1.39 MB)

This e-book provides some expert insight on your GDPR journey, covering the challenges and offering some solutions and first-hand advice.

Riskonnect pdf Download (218 KB)

Riskonnect’s Governance, Risk and Compliance (GRC) suite of solutions improves the efficiency and consistency of managing all compliance, risk, vendor, information security and governance business processes.

BitsightTN pdf Download (82 KB)

Monitor and regularly test third-party security performance and adherence to the GDPR. Key Takeaways:

BarracudaTN pdf Download (248 KB)

Ransomware is a malware variant that locks an end user’s computer or encrypts their files, then demands a sum of money to allow access or decryption. What’s worse, if an organization hands over the cash, there are often times when the attacker doesn’t play nice and still withholds the key even after payment.

QualysTN default Download

Qualys File Integrity Monitoring (FIM) is a highly scalable and centralized cloud app that logs and centrally tracks file change events on common enterprise operating systems in organizations of all sizes. Qualys FIM provides customers a simple way to achieve centralized cloud-based visibility of activity resulting from normal patching and administrative tasks, change control exceptions or violations, or malicious activity — then report on that system activity as part of compliance mandates.

Riskonnect pdf Download (314 KB)

The Riskonnect Compliance Management solution provides a comprehensive framework to consistently manage compliance activity across the entire organization.

BarracudaTN pdf Download (149 KB)

On the day in 2015 when A.J. Murray, the United States IT Manager for Hayward Tyler Group PLC, realized that cyber thieves had hijacked a large amount of important data using a variant of the Cryptolocker ransomware, he understood immediately that the potential downside was enormous. The data seized and encrypted was critical to ongoing day-to-day business.

BitsightTN pdf Download (250 KB)

Risk managers in particular have a vested interest in ensuring their organisations are prepared for the GDPR—which is why we created this guide. In it you’ll find:

Banner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Log in Register

Please Login to download this file

Username *
Password *
Remember Me

Banner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Banner

CyberBanner

CyberBanner

Go to top