Remove Data collection Remove Technology Remove Webinar
article thumbnail

News alert: NCA’s Data Privacy Week webinars highlight data protection for consumers, businesses

The Last Watchdog

22, 2024 – Today, the National Cybersecurity Alliance (NCA) , announced the program for its third annual Data Privacy Week campaign, which will take place from January 22nd to January 27th. This even includes information about a person’s physical well-being, like health data from apps.

article thumbnail

CSTA Turns 400 – Proof That Technology Integrations Is Exactly What You Are Looking For

Cisco Security

With the addition of Kenna Security into our program we now have over 250 technology partners and over 400 integrations for our mutual customers to utilize. An integration with Cigent Technology is now available for Secure Endpoint customers to integrate with. Kenna has a healthy 3rd Party ecosystem of technology partners.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How boards can manage digital governance in the age of AI

BH Consulting

If there is one statistic that sums up the increasing pace of technological change, it might well be this. Dr. Valerie Lyons, COO of BH Consulting, talked about these critical topics for the Institute of Directors Ireland in a recent webinar. And they need to do this while navigating an increasingly complex regulatory landscape.

article thumbnail

Privacy issues in smart cities – Lessons learned from the Waterfront Toronto – Sidewalks project

Privacy and Cybersecurity Law

Risk # 3: Excessive collection of personal data. The breadth of personal data collection in digital solutions in smart city projects makes it difficult to contain it to what is necessary for specific purposes. Risk # 5: Data Monetization. This must be addressed through the procurement contract. Share on Facebook.

article thumbnail

PRIVACY ISSUES IN SMART CITIES – LESSSONS LEARNED FROM THE WATERFRONT TORONTO – SIDEWALKS PROJECT

Privacy and Cybersecurity Law

Risk # 3: Excessive collection of personal data. The breadth of personal data collection in digital solutions in smart city projects makes it difficult to contain it to what is necessary for specific purposes. Risk # 5: Data Monetization. This must be addressed through the procurement contract. Share on Facebook.

article thumbnail

The Case for Multi-Vendor Security Integrations

Cisco Security

Just like the myriad expanding galaxies seen in the latest images from the James Webb space telescope, the cybersecurity landscape consists of a growing number of security technology vendors, each with the goal of addressing the continually evolving threats faced by customers today. Read more here. Sumo Logic. Read more here.

Firewall 145
article thumbnail

Security Roundup June 2024

BH Consulting

Operational technology covers UPS, distributed control systems and programmable logic controllers. There’s a summary page, together with a more detailed report and a webinar explaining the key details. IT includes routers, wireless access points, servers, computers and printers. The findings also break down open ports by industry.