Access "Navigating international data privacy laws "
This article is part of the May 2011 issue of Comprehensive information security programs vital for PCI compliance
With the global economic downturn, economies of scale are of increasing importance, and to achieve cost synergies, many companies have shed their geographic silos in favor of a streamlined centralized data infrastructure. Far more multinational companies with offices on all continents and production facilities in multiple countries share centralized databases, processing capabilities, and even IT support teams that make integrated production possible on a 24/7 basis. While we have seen many industries such as life sciences, real estate and entertainment streamline their IT operations, all have one item in common -- they store personal employee, customer, supplier and website visitor data. With the myriad data privacy, security and management laws that exist in the U.S. and abroad, data privacy compliance can be a difficult area to navigate. By now, most companies understand that U.S. federal, state and local governments have weaved an intricate web of laws protecting many aspects of Americans’ privacy (i.e., banking, telecom services, higher education, ... Access >>>
Premium Content for Free.
Navigating international data privacy laws
by Cynthia O’Donoghue, Katharina A. Weimer and Amy Mushahwar
Companies should revisit streamlined global data operations with an eye toward revamping compliance.
Robust information security program key to PCI compliance requirements
by Eric Holmquist
A strong information security program that goes beyond minimum standards will ease compliance.
- Navigating international data privacy laws by Cynthia O’Donoghue, Katharina A. Weimer and Amy Mushahwar
Gaining awareness to prevent social engineering techniques, attacks
by Marcia Savage
Cybercriminals are using social engineering fueled by social media to attack users and break into companies.
Smartphone encryption, authentication ease mobile management
by Robert Westervelt, News Director
New security tools allow companies to extend encryption and authentication to mobile devices.
- Gaining awareness to prevent social engineering techniques, attacks by Marcia Savage
Information security professionals and the resource gap
by (ISC)2 Advisory Board of the Americas Executive Writers Bureau
There’s growing demand for information security professionals, but where will these skilled people come from?
Information security job titles: Irrelevant to your career
by Lee Kushner and Mike Murray
Remember, potential new security roles are doled out based on experience and accomplishments, not some fancy title.
Breaches highlight need for better employee security awareness training
by Marcia Savage
Companies need to improve their employee security awareness training to fight today’s threats.
- Information security professionals and the resource gap by (ISC)2 Advisory Board of the Americas Executive Writers Bureau
More Premium Content Accessible For Free
FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-ins is real. This guide to secure ...
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...