Transparent Use of Personal Data Critical to Election Integrity in UK

Transparent Use of Personal Data Critical to Election Integrity in UK

Editor’s note: The ISACA Now blog is featuring a series of posts on the topic of election data integrity. ISACA Now previously published a US perspective on the topic. Today, we publish a post from Mike Hughes, providing a UK perspective. In some ways, the UK has less to worry about when it comes to protecting the integrity [...]

Cloud Compliance: The Cheeseburger Principle

Cloud Compliance: The Cheeseburger Principle

We spend our days talking with people about the need to apply security and compliance best practices in their cloud environment, and then helping them maintain automated visibility and remediation of vulnerabilities. We try to imprint on them the notion that security never stops; to truly have the best odds of keeping an environment secure, [...]

Workforce Study Methodology and Defining the Gap

Workforce Study Methodology and Defining the Gap

2,930,000 That is the size of the global cybersecurity workforce gap. The breakdown is around 498,000 in North America, 136,000 in Latin America, 142,000 in Europe, the Middle East and Africa, with the largest deficit coming in Asia Pacific at 2.14 million. But what does this big, scary number even mean? Where did it come [...]

Key Considerations for Assessing GDPR Compliance

Key Considerations for Assessing GDPR Compliance

The European Union General Data Protection Regulation (GDPR), which took full effect in May this year, solidifies the protection of data subjects’ “personal data,” harmonizes the data privacy laws across Europe and protects and empowers EU citizens’ data privacy, in addition to changing the way data is managed and handled by organizations. The GDPR regulation [...]

The Path to Improved Cybersecurity Culture

The Path to Improved Cybersecurity Culture

The recent ISACA-CMMI Institute cybersecurity culture research illustrates the accomplishments and gaps that are seen in organizations’ cybersecurity culture. The survey-driven research focuses on culture and continuous improvement, both essential components to a successful cyber risk management program. In this blog post, I will highlight some of the survey’s findings and then discuss ways you can improve [...]