Insight Search

Sort by:
  • Whitepaper

    October 25, 2021
    Dalle Raccomandazioni del Comitato Europeo per la protezione dei dati alle Clausole Contrattuali Standard della Commissione Europea quali sono le regole e come applicarle Secondo le raccomandazioni emanate il 18 giugno 2021 dall’European Data Protection Board (EDPB), le aziende devono dotarsi di una nuova metodologia per gestire i trasferimenti di dati personali all’estero ed essere in grado di…
  • Whitepaper

    September 29, 2021
    Come gestire i rischi cyber connessi alle esternalizzazioni di processi e servizi Il Governo ha di recente portato a 223 i soggetti inclusi nel Perimetro di Sicurezza Nazionale Cibernetico con il DPCM n. 81 del 14 aprile 2021, che integra un precedente DPCM (n. 131 del 30 luglio 2020) sugli obblighi per le imprese che nella catena di approvvigionamento utilizzano servizi/beni ICT…
  • Newsletter

    November 6, 2019
    Cambiano scenari e modelli, “incursori” e attori della protezione e non sempre l’approccio a silos basato sui controlli (regolamentarie non) e sulla sicurezza operativa riesce a precedere nuovi fenomeni. Se il cyber risk è fra le prime preoccupazioni per le aziende europee (italiane comprese) come indica il report “Regional Risk for Doing Business 2019” diffuso dal World Economic…
  • Video

    September 3, 2020
    Cyber risk quantification (CRQ) uses industry leading and highly vetted probabilistic models to more accurately describe the cyber security and technology-based risks facing an organisation. Tune in to Protiviti's subject matter experts answer 15 frequently asked questions about CRQ.
  • Whitepaper

    May 20, 2021
    A Primer for Federal Government Contractors On May 12, 2021, President Joe Biden signed an Executive Order (EO) to improve the United States’ cybersecurity and protect federal networks. Following the SolarWinds breach and, most recently, the Colonial Pipeline ransomware attack, the EO is the most recent action in the Biden administration’s plan to overhaul U.S. cybersecurity…
  • Whitepaper

    September 2, 2021
    Cyber attacks are rampant Let’s face it, cyber security professionals are not faring well against the increasing sophistication of attacks by hackers. According to the 2020 Verizon Data Breach Investigations report, the world witnessed a challenging year with a whopping 96% increase in successful data breaches against U.S. companies and government agencies as compared to 2019. Cyber attacks…
  • Podcast

    October 8, 2020
    Welcome you to a new edition of Powerful Insights and our continuing series on cybersecurity awareness. This series is intended to highlight ways organisations can be proactive in addressing these critical security challenges. We explore how leaders can dynamically build cyber resilience while maximising value. In this series, we will be talking to our cybersecurity leaders who are in…
  • Whitepaper

    July 22, 2021
    The future of organisations will be built on the ability to work securely from anywhere, using any device at any time. This was made clear during the COVID-19 pandemic, which forced millions of workers to work from home using company-owned or personal devices. As the velocity and persistence of cybersecurity attacks increase daily and digital transformation continues to be a priority for…
  • Flash Report

    March 3, 2021
    The Commonwealth of Virginia passed the Consumer Data Protection Act (CDPA) into law on March 2, 2021, following overwhelming bipartisan support for a state consumer privacy law. The November 2020 election results provided the much needed impetus to strengthen consumer privacy for the Commonwealth of Virginia. State officials wasted no time in introducing the privacy bill. Now that the…
  • Whitepaper

    June 1, 2022
    A hybrid RBAC, ABAC and PBAC framework is the best practice approach A strong access management programme is foundational to establishing a Zero Trust environment by using contextual information to continuously validate that users are who they say they are and by restricting user access to necessary resources only. Within the Zero Trust framework, identity governance and risk-based…
Loading...