Computer Weekly 20 September 2011: Download the new issue of the UK's leading technology publication, featuring in-depth analysis of the latest IT news and technology trends
By: TechTarget ComputerWeekly.com View more from TechTarget ComputerWeekly.com >>
Download this next:
Essential Guide: What the EU Data Protection Regulation changes mean to you
By: TechTarget ComputerWeekly.com
Type: Essential Guide
With the new European Data Protection Regulation on the way you will need to keep up to date on the intricacies of the new data protection law.
This guide offers you news, tips and features on the new regulation and how it may affect you and your organisation.
These are also closely related to: "Computer Weekly 20 September 2011: Download the new issue of the UK's leading technology publication, featuring in-depth analysis of the latest IT news and technology trends"
-
Data protection in the age of Brexit and GDPR
By: TechTarget ComputerWeekly.com
Type: eGuide
Discussions around data protection continue to be dominated by Brexit and the GDPR. And even as the GDPR is driving data protection maturity internationally, many companies are still playing catch-up.
This 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity, with insight into why many firms still stuck in the GDPR prep phase after its initiation.
Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.
-
Your GDPR guide
By: TechTarget ComputerWeekly.com
Type: eGuide
Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.
Fortunately, the need to comply with the General Data Protection Regulation (GDPR) from 25 May 2018 and planned UK legislation designed to align perfectly with the GDPR is likely to drive most companies handling EU citizens’ data to reassess their data protection capabilities, particularly in relation to personal data.
However, the need for every business to pay attention to data protection is underlined by the fact that data breaches have been shown to have a direct correlation to falls in share prices, sometimes wiping off tens of millions from the market value.
Data protection is not only important from a compliance and business value protection point of view, it is also key to fostering the digital economy and gaining a competitive edge, according to UK information commissioner Elizabeth Denham.
Failure to protect and handle data correctly can also result in punitive actions for companies participating in the digital economy, as Google found out recently when a consumer protection organisation in Denmark asked the government to investigate allegations that Google is breaking privacy laws by not limiting how long it stores personal data.
As companies move increasingly into the cloud, it is important that they adapt their data protection strategies accordingly, but at the same time, experts say enterprises should not forget tape storage when it comes to data protection, nor should they overlook cloud storage because of the agility it affords.
However, before launching into cloud-based storage, there are several key questions organisations need to ask to ensure that a cloud-based data storage and protection strategy is right for them.
Find more content like what you just read:
-
Computer Weekly – 18 October 2022: How Russia hacked a former MI6 spy chief
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, Russian hackers leaked emails and documents from British government, military, and intelligence officials – we examine the implications. New EU laws will govern online safety and the use of AI, but what do they mean for organisations? And we look at the growth in checkout-free shopping. Read the issue now.
-
Risk management is the beating heart of your cyber strategy
By: TechTarget ComputerWeekly.com
Type: eBook
In this E-Guide we will explore four separate aspects of this wide-ranging topic area, beginning with a look ahead at some of the most impactful and significant data privacy trends likely to affect your risk and compliance strategy during 2022.
-
Computer Weekly – 31 May 2022: Trial and error – why the law on computer evidence must change
By: TechTarget ComputerWeekly.com
Type: Ezine
In this week's Computer Weekly, the Post Office IT scandal highlighted the problem with computer evidence – we examine the need for legal reform. We assess the nuclear option for sustainable datacentre power. And we find out how IT experts can improve their soft skills and boost their career prospects as a result. Read the issue now.
-
7 free GRC tools for compliance professionals
By: TechTarget ComputerWeekly.com
Type: eGuide
All organisations need to meet a variety of regulatory compliance requirements, such as General Data Protection Regulation (GDPR), but they don't all have the budget for GRC software. In this e-guide, learn about the free, open source options.
-
Top 10 IT in the Nordics stories of 2019
By: TechTarget ComputerWeekly.com
Type: eGuide
The Nordic region punches above its weight in IT terms, with a rich tech ecosystem that ranges from clusters of tech startups creating the latest apps to large in-house IT teams transforming traditional industries. Here are Computer Weekly's top 10 Nordic enterprise IT stories of 2019.
-
The importance of compliance principles
By: OneTrust
Type: eBook
Compliance forms the center of any security strategy. This e-book will take a closer look at the principles enshrined in the General Data Protection Regulation (GDPR), those found under the CCPA, and the EU-US Data Privacy Framework (EU-US DPF). Read on to learn more.
-
20 FAQs about the EU-US Data Privacy Framework revealed
By: OneTrust
Type: eBook
The EU-US Data Privacy Framework is designed to improve the safety of transatlantic data flows. Despite this framework becoming effective last year, questions remain surrounding the framework’s applicability, certification, and Transfer Impact Assessments. Gain answers to your questions about this framework’s impact in this e-book.
-
How to use frameworks as part of a comprehensive security strategy
By: JAMF
Type: eBook
Cybersecurity frameworks address many of the key challenges common to security strategies by providing a clear, concise roadmap for managing cybersecurity plans. This e-book is designed to show you how you can use cybersecurity frameworks as part of a comprehensive security strategy. Read on to learn more.
-
Compliance risk map: Learn how EED will impact your organization
By: Schneider Electric
Type: Infographic
Download this exclusive infographic for the EED compliance risk heat map, and find out how your business may be affected.
-
10 benefits of AI-powered identity compliance
By: SailPoint Technologies
Type: eBook
Meeting and maintaining compliance entails high volumes of work, often comprised of tedious, repetitive and redundant tasks. With AI you can meet compliance, secure identities, and save resources by automating these tasks. Read this e-book to learn more.
-
HardenStance: Preparing for New Incident Reporting Requirements
By: Palo Alto Networks Unit42
Type: White Paper
More stringent incident reporting rules, with wider scopes and broadening coverage, are becoming increasingly adopted by governments worldwide. To make these new measures as frictionless as possible, it’s important to engage proactively with local agencies and define a material incident for your organization. Download this paper to learn more.
-
Meet the GRC challenges of the cloud head-on
By: Dell Software
Type: eGuide
Use this expert e-guide to learn about the security changes Sabre, a travel-technology company, made to meet the new GRC needs placed upon them after their migration to the cloud. You'll also find a helpful FAQ on the implications of compliance audits on your IT functions.
-
From CCPA to Brazil’s LGPD: Understanding current data privacy laws
By: OneTrust
Type: eBook
Whether you’re new to privacy or have been working in the space for some time, it can be a confusing place. There are strange terms, countless acronyms, hundreds of laws—many of which overlap—and multiple reasons to justify the importance of privacy. Use this e-book to master the basics of data privacy and protection.
-
Security audits: How to prep for a more successful experience
By: Dell Software
Type: eGuide
In this expert e-guide, we explore how you can prepare for and participate in a security audit. Find out what you should do in advance to get ready for the auditor's visit and how to address gaps once they've been identified.
-
The 4 stages of the Data Privacy Maturity Model
By: OneTrust
Type: eBook
The more your customers trust your business, the more data they will ultimately share with you, so data privacy is paramount. Download this e-book, which details the 4 stages of the Data Privacy Maturity Model and illustrates how to progress from one stage to the next.