CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
  • See all results
Home
Resources
Oldest
  • Latest
  • Oldest
  • Random
  • A to Z

Resources

Videos, eBooks and other useful resources to address the challenges faced by data protection, privacy and cybersecurity leaders.

Image of engineer drawing plans on a wall representing the use of ISACA's privacy principles to develop an effective privacy program
Data PrivacyResources

Webinar: Using ISACA’s Privacy Principles to Create an Effective Privacy Program

September 22, 2016
To help information security, privacy and compliance professionals architect and implement the best security and privacy practices for your organization, Rebecca Herold, lead developer and author of ISACA's Privacy Principles and Program Management Guide, provides an overview of the 14 principles and explain the importance for each business, in any country, to implement them within their own organizations. Read More
Image of engineer drawing plans on a wall representing the use of ISACA's privacy principles to develop an effective privacy program
Data PrivacyResources

eBook: Using ISACA’s Privacy Principles to Create an Effective Privacy Program

October 18, 2016
To help information security, privacy and compliance professionals architect and implement the best security and privacy practices for your organization, Rebecca Herold, lead developer and author of ISACA's Privacy Principles and Program Management Guide, provides an overview of the 14 principles and explain the importance for each business, in any country, to implement them within their own organizations. Read More
Image of man standing in front of wall with the words compliance and regulations to signify need for buying privacy software
Data ProtectionResources

The Ultimate Guide to Buying Privacy Software

March 18, 2018
Nymity's 2018 Privacy Compliance Software Buyer's Guide helps a Privacy Office to navigate the different types of privacy compliance software and to best decide where to invest in order to mitigate risk, build accountability, and achieve ongoing compliance. Get the ultimate guide to buying privacy software. Read More
Regulator reviewing EU GDPR compliance documents through magnifying glass
Data ProtectionResources

Are You Ready to Report on GDPR Compliance?

September 7, 2018
Many regulators prefer voluntary GDPR compliance, but are prepared to back that up with tough action when required. This is why your reporting must be ‘regulator ready’. Read More
Businessman submitting report on GDPR compliance to the regulator
Data ProtectionResources

Are You Ready to Report on GDPR Compliance?

October 5, 2018
Regulatory reporting for GDPR compliance requires effectively operationalising the use of appropriate technical and organisational measures to allow for reporting at the enterprise and project level. Read More
Hands holding glasses in front of computer screen to adopt a hacker's point of view
Cyber SecurityResources

Adopting a Hacker’s Point of View

October 31, 2018
Just like detectives look into the mind of a criminal to solve the case, you can look into the mind of a hacker to guard your company’s online data. Hackers adapts quickly to new environments and enjoys a challenge. What are insights to be gleaned from their endeavors.? Read More
Hook picking up a lock showing phishing scams on computer system
Cyber SecurityResources

How to Protect Your Business from Phishing Scams

January 18, 2019
According to a recent report, 90% of all data breaches can be traced back to phishing attacks. How can businesses effectively protect themselves from this damaging cybercrime? Read More
Portrayal of a city destroyed by tsunami waves showing need for effective business continuity plan
Cyber SecurityResources

Creating an Effective Business Continuity Plan

February 1, 2019
Just like any business plan, a business continuity plan is incredibly important to make sure your business continues to functions optimally after facing a disaster scenario. Learn the six steps for a effective BCP. Read More
Image of brain above circuit board showing what enterprises need for successful AI
Data PrivacyResources

The Enterprise Guide to Successful AI

February 13, 2019
AI is now disrupting every industry. To ensure long term success with AI, companies must approach the integration of AI through an “AI Triple Win” framework of utility, privacy/security, and trust. Read More
Data Protection and Privacy Officer Priorities
Data ProtectionResources

Data Protection and Privacy Officer Priorities 2019

March 12, 2019
Annual survey of 252 data protection and privacy officers provides valuable benchmarking information for organizations across all industries on their 2019 priorities. Read More
Load More

Latest

Pedestrians cross the road in India showing impact of data breach on payment processor

Amazon, Swiggy Payment Processor Juspay Downplays Data Breach That Led To 100 Million Records Circulating on the Dark Web

Businessman walks in airport terminal showing potential immunity passports as COVID vaccine rolls out

Controversial “Immunity Passports” Debated as COVID Vaccine is Rolled Out

Flags of the European Union flying showing EDPB cross border data transfer guidance post Schrems II

European Data Protection Board Highlights Ways to Comply

People using messaging apps on smartphone showing revelations by privacy labels

New iOS Privacy Labels Reveal Major Data Collection Differences Between Messaging Apps

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Follow us

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow us

© 2020 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
Start typing to see results or hit ESC to close
U.S. Regulations Data Breach EU GDPR Cyber Threat
See all results