Management, compliance & auditing

Management, compliance & auditing
Uncover the 10 crucial cybersecurity steps to ensure maximum digital safety. Be proactive in your security with this comprehensive guide.

July 23, 2024
Stephan Miller
Management, compliance & auditing
AI is constantly evolving as a threat and as a solution to protect your organization. Are you accounting for it?

November 18, 2023
Ellen Pincus
Management, compliance & auditing
Congratulations on securing an interview for the security architect role! Security architects design and configure systems to protect the infrastructure and

April 27, 2023
Simon Puleo
Management, compliance & auditing
Learn a quick overview of the federal government’s privacy and cybersecurity laws.

January 30, 2023
John Bandler
Management, compliance & auditing
Learn how federal and state privacy laws intersect with cybersecurity and how to comply without being overwhelmed.

September 20, 2022
John Bandler
Management, compliance & auditing
Find out why your company should look into how payment card industry data security standards affect your business.

September 14, 2022
Ken Chikwanha
Management, compliance & auditing
The Payment Card Industry Data Security Standard, or PCI DSS, is a set of measures designed to help protect customers’ data and reduce credit card fraud.

July 15, 2022
Ken Chikwanha
Management, compliance & auditing
Take these steps to keep your infosec team from burning out at work.

June 09, 2022
Christine McKenzie
Management, compliance & auditing
Information security professionals benefit when they learn foundational principles of United States law.

May 31, 2022
John Bandler
Management, compliance & auditing
Learn about data protection practices that will help you keep your data safe.

April 22, 2022
Ralph O'BrienIn this Series
- Top 10 cybersecurity best practices: Secure your organization’s data
- Is AI cybersecurity in your policies?
- The top security architect interview questions you need to know
- Federal privacy and cybersecurity enforcement — an overview
- U.S. privacy and cybersecurity laws — an overview
- Common misperceptions about PCI DSS: Let’s dispel a few myths
- How PCI DSS acts as an (informal) insurance policy
- Keeping your team fresh: How to prevent employee burnout
- How foundations of U.S. law apply to information security
- Data protection Pandora's Box: Get privacy right the first time, or else
- Privacy dos and don'ts: Privacy policies and the right to transparency
- Starr McFarland talks privacy: 5 things to know about the new, online IAPP CIPT learning path
- Data protection vs. data privacy: What’s the difference?
- NIST 800-171: 6 things you need to know about this new learning path
- Working as a data privacy consultant: Cleaning up other people’s mess
- 6 ways that U.S. and EU data privacy laws differ
- Navigating local data privacy standards in a global world
- Building your FedRAMP certification and compliance team
- SOC 3 compliance: Everything your organization needs to know
- SOC 2 compliance: Everything your organization needs to know
- SOC 1 compliance: Everything your organization needs to know
- Overview: Understanding SOC compliance: SOC 1 vs. SOC 2 vs. SOC 3
- How to comply with FCPA regulation – 5 Tips
- ISO 27001 framework: What it is and how to comply
- Why data classification is important for security
- Threat Modeling 101: Getting started with application security threat modeling [2021 update]
- VLAN network segmentation and security- chapter five [updated 2021]
- CCPA vs CalOPPA: Which one applies to you and how to ensure data security compliance
- IT auditing and controls – planning the IT audit [updated 2021]
- Finding security defects early in the SDLC with STRIDE threat modeling [updated 2021]
- Cyber threat analysis [updated 2021]
- Rapid threat model prototyping: Introduction and overview
- Commercial off-the-shelf IoT system solutions: A risk assessment
- A school district's guide for Education Law §2-d compliance
- IT auditing and controls: A look at application controls [updated 2021]
- 6 key elements of a threat model
- Top threat modeling frameworks: STRIDE, OWASP Top 10, MITRE ATT&CK framework and more
- Average IT manager salary in 2021
- Security vs. usability: Pros and cons of risk-based authentication
- Threat modeling: Technical walkthrough and tutorial
- Comparing endpoint security: EPP vs. EDR vs. XDR
- Role and purpose of threat modeling in software development
- 5 changes the CPRA makes to the CCPA that you need to know
- 6 benefits of cyber threat modeling
- What is threat modeling?
- First Safe Harbor, then Privacy Shield: What EU-US data-sharing agreement is next?
- How to make cybersecurity budget cuts without sacrificing security
- How to mitigate security risk in international business environments
- Security theatrics or strategy? Optimizing security budget efficiency and effectiveness
- NY SHIELD Act: Security awareness and training requirements for New York businesses