Remove Data collection Remove Digital transformation Remove Government
article thumbnail

How boards can manage digital governance in the age of AI

BH Consulting

In a presentation titled Digital governance for boards and senior executives: AI, cybersecurity, and privacy , she called on her extensive experience advising boards on these areas. Boards and senior executives face several questions about how best to approach the challenges of cybersecurity, privacy, and AI governance.

article thumbnail

The State of Digital Trust in 2025 - Consumers Still Shoulder the Responsibility

Thales Cloud Protection & Licensing

In 2024, 44% of consumers globally trusted banks with their personal data, but by 2025, this figure dropped to 32% for those aged 1624. While insurers benefit from regulatory oversight like the banking sector, persistent friction points like opaque claims processes and intrusive data collection eroded goodwill.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IATA Cyber Regulations

Centraleyes

Governments and regulatory authorities may also mandate compliance with IATA standards to align with broader cybersecurity strategies. Recent amendments have focused on addressing vulnerabilities linked to digital transformation in aviation, such as the use of cloud technologies and IoT devices. and the EU Cybersecurity Act.

Risk 52
article thumbnail

Masterclass in CIAM for Insurance: Balancing Security, Experience, and Consent

IT Security Guru

These regulations stress the fair treatment of customers, transparent sales practices, robust governance and consent. CIAM platforms facilitate this process by allowing “just-in-time” data collection at various touchpoints along the user journey, enriching customer profiles and enabling personalised services.

Insurance 125
article thumbnail

NEW TECH: Why it makes more sense for ‘PAM’ tools to manage ‘Activities,’ instead of ‘Access’

The Last Watchdog

PAM governs a hierarchy of privileged accounts all tied together in a Windows Active Directory ( AD ) environment. The speed of digital transformation is adding new challenges to the mix,” Lansing says. The data collection and data analytics know-how to do this are well-understood and readily available.

article thumbnail

How to prepare for the California Consumer Privacy Act

Thales Cloud Protection & Licensing

For example, data collected by an entity may not be associated with an individual but could identify a household. Under the CCPA publicly available information is defined as “lawfully made available from federal, state, or local government records, if any conditions associated with such information.”. Where is a CISO to begin?

article thumbnail

5 Best Practices for Data Privacy Compliance

Centraleyes

Privacy platforms like OneTrust, TrustArc, BigID, and Centraleyes are popular tools for automating data privacy compliance. These tools facilitate compliance and enhance overall data governance. Data Minimization Best Practices: Limit Data Collection : Only collect personal data that is essential for its specific purpose.