Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

Privacy/Data Protection

Welcome to the Privacy/Data Protection topic!

Collaborate, contribute, consume and create knowledge around topics such as privacy frameworks and governance (OECD), protection of data, data leaks and data communicated across borders

ISACA members can participate by clicking on the “Join this Community” button. You must be signed into the site. Set your alerts to be notified of new discussion activity within this community. Not an ISACA member? Join now!

 
This Topic Has:
1462 Members
0 Online
14028 Visits

Community Leader

Amedeo808

Amedeo808

Badge: Energizer

Marc Vael

Marc Vael

Title: Chief Information Security Officer

Badge: Energizer

ShanShan

ShanShan

Badge: Social

 

NEW! Activity Badges

Badges help others understand your level of community activity and your reputation as a contributor within the Knowledge Center. Learn More.

Discussions: 137 total

Must be a Topic member to contribute
View All »
Hi all, Apparently, the GDPR storm is over and all the apocalyptic news about the consent were just fairy tales from the Middle Ages. Any news from the "real" front line? Still dealing with the consent? Are you ready for the new doomsday, September the...
Amedeo808 | 7/6/2018 3:36:51 PM | COMMENTS(11)
Everyone ready for GDPR? How are folks dealing with employee data in HR systems when it comes to requests to review, port and be forgotten?
Ramon084 | 5/17/2018 11:15:24 PM | COMMENTS(2)
Hi all,I am working on a risk assessment for a personal device for business use audit. I have been researching online but found nothing regarding any breaches of personal information/data privacy using Cisco Webex messengers. I'm particularly interested i...
Alyassia957 | 5/15/2018 2:19:35 PM | COMMENTS(0)
Hi All, I've been asked to come up with an outline scope/plan for an Encryption audit for my org. We've never done one before. They aren't sure what the scope should be yet, and I have so many avenues - data at rest vs. data in transit, VPN security, desk...
Jeff Murfin | 4/17/2018 1:50:16 PM | COMMENTS(4)
a new revision for 2018 ISO/IEC 27000:   https://www.iso.org/news/ref2266.html
Lynda793 | 4/17/2018 7:18:35 AM | COMMENTS(2)
Good morningall I would be very interested in your opinions on the following situation: My company hosts an eCommerce site.  When customers visit the site we record their IP address and some details of the request in infrastructure log files (Load Balance...
Kevin655 | 4/17/2018 5:49:04 AM | COMMENTS(6)

Documents & Publications: 40 total

Must be a Topic member to contribute
View All »
Information Systems Assurance and Control Guideline for Verifing Compliance with Personal Data Protection Act [POLAND]
Posted by JoannaK 1630 days ago
Books
Posted by ISACA 136 days ago

Events & Online Learning: 7 total

13 Aug 2018
ISACA International Event
Nashville, Tennessee, US
2018 GRC Conference - 13-15 August , Nashville, TN. Explore the future of Governance Risk and Control through expert-led workshops and sessions developed by the IIA and ISACA. Register early for our GRC learning tracks.

Journal Articles: 107 total

Volume 4, 2018
by Dave Brunswick
Companies facing the EU’s looming General Data Protection Regulation (GDPR) compliance mandate could benefit from a modernized managed file transfer (MFT) solution.
Volume 3, 2018
by Charles Hale, CCNA, CISSP, MCSE
With the aggressive pace at which data have grown and the need for constant real-time access becoming the norm, paying increased attention to securing networks and data has become critical.
Volume 3, 2018
by Giuliano Pozza, CGEIT, e-CF Plus (CIO), ITIL v3
The world of information and data management is changing faster than anyone could have predicted a few years ago, and attention to sensitive data protection is growing, as the new GDPR is clearly proving.
Volume 3, 2018
by Chip Jarnagin, CISSP, CSM, PMP, and Sonja Hammond, CISSP, ITIL Foundation, PCI-ISA
The exposure of data for up to 14 million of Verizon’s customers in July 2017 was an enormous embarrassment, particularly for an organization that presents itself as a premium cybersecurity consultancy.
Volume 3, 2018
by T. Sean Kelly
Proactive IG requires collaboration among legal, compliance, security and IT teams to take an incremental, measurable approach to deal with today’s enterprise data challenges.
Volume 3, 2018
by Max Alexander, CISM, CRISC, CISSP, DoD Cyber Crime Investigator
Insider threats pose a tremendous risk to an organization’s information security because, due to their nature, insiders “already have access to an organization’s most sensitive data.”

Wikis: 2 total

Blog Posts: 33 total

2 Apr 2018
After privacy was silently lost in modern era, GDPR will try to put the ghost back in the bottle. Will it succeed?
Posted By : Dragan Pleskonjic | 0 comments
Have you experienced ransomware attack so far and, if yes, what did you do to resolve? I set up Twitter poll here: https://twitter.com/DPleskonjic/status/953608717399941120 It lasts for seven days. Thank you for taking part in the poll.
Posted By : Dragan Pleskonjic | 5 comments
My personal thoughts after listening to C-level executives at the CxO Roundtable Series sponsored by Intel, IBM, HyTrust & ReedSmith. For an invite, please reach out to me. Data Protection under the GDPR For past few months, I’ve been helping to org...
Posted By : Thomas152 | 1 comments
Information Security and Privacy is hot issue at present time. Number of security breaches is rapidly increasing.  In case of late detection, costs of breaches are skyrocketing. In the same time Artificial Intelligence (AI), Machine Learning (ML) are fast...
Posted By : Dragan Pleskonjic | 0 comments
My previous blog under name "Dragan on Security" was at location: http://conwex.info/blog/. It was active from August 28, 2005 to October 3, 2012. By beginning of 2017 it is moved to new location http://www.dragan-pleskonjic.com/blog/. With possibility to...
Posted By : Dragan Pleskonjic | 0 comments
La demanda de servicios bancarios a través de Internet, producto del surgimiento de nuevas necesidades en los consumidores atraídos por el auge tecnológico, mantiene a las entidades financieras inmersas en una encrucijada en la cual deben equilibrar el ni...
Posted By : Gerardo Zuñiga | 1 comments