CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
  • See all results
Home
Resources
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Resources

Videos, eBooks and other useful resources to address the challenges faced by data protection, privacy and cybersecurity leaders.

Image of man standing in front of wall with the words compliance and regulations to signify need for buying privacy software
Data ProtectionResources

The Ultimate Guide to Buying Privacy Software

March 18, 2018
Nymity's 2018 Privacy Compliance Software Buyer's Guide helps a Privacy Office to navigate the different types of privacy compliance software and to best decide where to invest in order to mitigate risk, build accountability, and achieve ongoing compliance. Get the ultimate guide to buying privacy software. Read More
Image of engineer drawing plans on a wall representing the use of ISACA's privacy principles to develop an effective privacy program
Data PrivacyResources

eBook: Using ISACA’s Privacy Principles to Create an Effective Privacy Program

October 18, 2016
To help information security, privacy and compliance professionals architect and implement the best security and privacy practices for your organization, Rebecca Herold, lead developer and author of ISACA's Privacy Principles and Program Management Guide, provides an overview of the 14 principles and explain the importance for each business, in any country, to implement them within their own organizations. Read More
Image of engineer drawing plans on a wall representing the use of ISACA's privacy principles to develop an effective privacy program
Data PrivacyResources

Webinar: Using ISACA’s Privacy Principles to Create an Effective Privacy Program

September 22, 2016
To help information security, privacy and compliance professionals architect and implement the best security and privacy practices for your organization, Rebecca Herold, lead developer and author of ISACA's Privacy Principles and Program Management Guide, provides an overview of the 14 principles and explain the importance for each business, in any country, to implement them within their own organizations. Read More
No More Content
Go Back To Homepage

Latest

Woman holding mobile phone with username and password login screen showing phishing campaign

Attackers Load Targeted Company’s Homepage in Email Phishing Campaign

Close up of girl paying music services with credit card showing Magecart attack on ecommerce site

Hackers Accessed Personal and Credit Card Information in Warner Music Group Magecart Attack

Indian friends using their mobile phones showing national security concerns with Chinese apps

India Expands National Security Ban of Chinese Apps; 118 Forbidden in Wake of Renewed Border Tensions

Close up of Apple MacBook Pro showing macOS malware

Apple Certifies the Most Prevalent macOS Malware Through Its Notarization Process – Twice

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

Thank you for subscribing!

Something went wrong.

We respect your privacy

Follow us

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Privacy Center
Do not sell my information

Stay Updated

Follow us

© 2020 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
Start typing to see results or hit ESC to close
U.S. Regulations Data Breach EU GDPR Cyber Threat
See all results