🕳 February Event Spotlight: IAPP Data Protection Intensive: France 2019, Privacy Insight Series Webinars, IAPP CCPA Comprehensive 2019 🕳
<code>Media</code><code>_____________________________________________________________________________</code><code>Media</code><code>IAPP Data Protection Intensive: France 2019
12 β 13 February
Paris </code><code>Join data protection professionals from across Europe for two days of concentrated learning, sharing, and networking at the IAPP Data Protection Intensive: France 2019 in Paris on 12-13 February. All sessions will be delivered by data protection experts in parallel tracksβone in English, the other in French. It is practical advice designed to improve your operational response to the GDPR and prepare you for future challenges.</code><code>TrustArc will be exhibiting and sponsoring the Networking Reception on 12 February. Stop by booth #6 to say hello!</code><code>Register here</code><code>_____________________________________________________________________________</code><code> </code><code>Media</code><code>Privacy Insight Series Webinar
The Path to U.S. β Japan Data Transfer Compliance
February 13 @ 9AM PT | 12PM ET | 5PM GMT
Online Webinar </code><code>Japanβs data protection law, the Act on the Protection of Personal Information (APPI) requires that companies have sufficient data protections for data transfers out of Japan. Since APPI went into effect in May 2017, companies, including subsidiaries of U.S.-headquartered companies in Japan, are liable for any violation and are subject to enforcement.</code><code>APPI recognizes that the APEC Cross Border Privacy Rules (CBPR) system is one mechanism to demonstrate that required data protections are in place. An APEC CBPR Certification can support companiesβ compliance efforts with APPI and show their commitment to secure U.S . -Japan data transfer.</code><code>This webinar will cover the following:</code><code>International data transfer requirements under APPI and who they apply to along with how the APEC CBPR system fits in with these requirements</code><code>Introduction to APEC CBPR certification, including benefits in the context of APPI requirements</code><code>Real-world examples from industry experts on how APEC CBPR certification can fit in with your global compliance strategy</code><code>> Register here</code><code>_____________________________________________________________________________</code><code>Media</code><code>Privacy Insight Series Webinar
Managing Risk & Easing the Pain of Vendor Management
February 20 @ 9AM PT | 12PM ET | 5PM GMT
Online Webinar </code><code>Whether youβre focused on GDPR, CCPA, HIPAA or Privacy Shield β one of the most important components of a privacy and security risk management program is to understand how your third party vendors are handling your data and whether they can maintain compliance. At the same time, youβre struggling to keep up with privacy assessments and security questionnaires about your own data handling practices.</code><code>A regulator may never ask about your GDPR compliance status but your largest customer probably will. Demonstrate your compliance or expand and efficiently scale a vendor management program.</code><code>This webinar will outline:</code><code>Options to demonstrate compliance against multiple regulations or buyer requirements</code><code>Tools and methodology to support privacy and security third party assessments</code><code>Ways to develop an independent validation program and process for ongoing assurance of a risk-based level of supplier compliance</code><code>> Register here</code><code>_____________________________________________________________________________</code><code>Media</code><code>IAPP CCPA Comprehensive 2019
February 25
Fremont, CA</code><code>Start planning your response to the California Consumer Privacy Act (CCPA) by diving into its details at the IAPP CCPA Comprehensive. This day-long examination of the law willβ¦
<code>Media</code><code>_____________________________________________________________________________</code><code>Media</code><code>IAPP Data Protection Intensive: France 2019
12 β 13 February
Paris </code><code>Join data protection professionals from across Europe for two days of concentrated learning, sharing, and networking at the IAPP Data Protection Intensive: France 2019 in Paris on 12-13 February. All sessions will be delivered by data protection experts in parallel tracksβone in English, the other in French. It is practical advice designed to improve your operational response to the GDPR and prepare you for future challenges.</code><code>TrustArc will be exhibiting and sponsoring the Networking Reception on 12 February. Stop by booth #6 to say hello!</code><code>Register here</code><code>_____________________________________________________________________________</code><code> </code><code>Media</code><code>Privacy Insight Series Webinar
The Path to U.S. β Japan Data Transfer Compliance
February 13 @ 9AM PT | 12PM ET | 5PM GMT
Online Webinar </code><code>Japanβs data protection law, the Act on the Protection of Personal Information (APPI) requires that companies have sufficient data protections for data transfers out of Japan. Since APPI went into effect in May 2017, companies, including subsidiaries of U.S.-headquartered companies in Japan, are liable for any violation and are subject to enforcement.</code><code>APPI recognizes that the APEC Cross Border Privacy Rules (CBPR) system is one mechanism to demonstrate that required data protections are in place. An APEC CBPR Certification can support companiesβ compliance efforts with APPI and show their commitment to secure U.S . -Japan data transfer.</code><code>This webinar will cover the following:</code><code>International data transfer requirements under APPI and who they apply to along with how the APEC CBPR system fits in with these requirements</code><code>Introduction to APEC CBPR certification, including benefits in the context of APPI requirements</code><code>Real-world examples from industry experts on how APEC CBPR certification can fit in with your global compliance strategy</code><code>> Register here</code><code>_____________________________________________________________________________</code><code>Media</code><code>Privacy Insight Series Webinar
Managing Risk & Easing the Pain of Vendor Management
February 20 @ 9AM PT | 12PM ET | 5PM GMT
Online Webinar </code><code>Whether youβre focused on GDPR, CCPA, HIPAA or Privacy Shield β one of the most important components of a privacy and security risk management program is to understand how your third party vendors are handling your data and whether they can maintain compliance. At the same time, youβre struggling to keep up with privacy assessments and security questionnaires about your own data handling practices.</code><code>A regulator may never ask about your GDPR compliance status but your largest customer probably will. Demonstrate your compliance or expand and efficiently scale a vendor management program.</code><code>This webinar will outline:</code><code>Options to demonstrate compliance against multiple regulations or buyer requirements</code><code>Tools and methodology to support privacy and security third party assessments</code><code>Ways to develop an independent validation program and process for ongoing assurance of a risk-based level of supplier compliance</code><code>> Register here</code><code>_____________________________________________________________________________</code><code>Media</code><code>IAPP CCPA Comprehensive 2019
February 25
Fremont, CA</code><code>Start planning your response to the California Consumer Privacy Act (CCPA) by diving into its details at the IAPP CCPA Comprehensive. This day-long examination of the law willβ¦
π΄ New Zombie 'POODLE' Attack Bred From TLS Flaw π΄
π Read
via "Dark Reading: ".
Citrix issues update for encryption weakness dogging the popular security protocol.π Read
via "Dark Reading: ".
Dark Reading
New Zombie 'POODLE' Attack Bred From TLS Flaw
Citrix issues update for encryption weakness dogging the popular security protocol.
π΄ US Law Enforcement Busts Romanian Online Crime Operation π΄
π Read
via "Dark Reading: ".
Twelve members of 20-person group extradited to US to face charges related to theft of millions via fake ads other scams.π Read
via "Dark Reading: ".
Darkreading
US Law Enforcement Busts Romanian Online Crime Operation
Twelve members of 20-person group extradited to US to face charges related to theft of millions via fake ads other scams.
β Google Boosts Encryption For Low-End Android Devices β
π Read
via "Threatpost | The first stop for security news".
Google's Adiantum boosts encryption for low-end devices with processors that do not have hardware support for AES.π Read
via "Threatpost | The first stop for security news".
Threat Post
Google Boosts Encryption For Low-End Android Devices
Google's Adiantum boosts encryption for low-end devices with processors that do not have hardware support for AES.
π Help! Need VPN recommendations for Android π
π Read
via "Security on TechRepublic".
What VPN would you recommend for an Android user who uses public WiFi quite often and wants to buff up their security?π Read
via "Security on TechRepublic".
TechRepublic
Help! Need VPN recommendations for Android
What VPN would you recommend for an Android user who uses public WiFi quite often and wants to buff up their security?
ATENTIONβΌ New - CVE-2009-5154
π Read
via "National Vulnerability Database".
An issue was discovered on MOBOTIX S14 MX-V4.2.1.61 devices. There is a default password of meinsm for the admin account.π Read
via "National Vulnerability Database".
β Monday review β the hot 24 stories of the week β
π Read
via "Naked Security".
From the FBI-supporting DNA kit company, to the privacy bug in gay dating app Jack'd, and everything in between. It's weekly roundup time.π Read
via "Naked Security".
Naked Security
Monday review β the hot 24 stories of the week
From the FBI-supporting DNA kit company, to the privacy bug in gay dating app Jackβd, and everything in between. Itβs weekly roundup time.
β Get-rich-quick social media scams are turning teens into money mules β
π Read
via "Naked Security".
Data shows that young people are most at risk of this type of fraud, in which they're talked into handing over their bank details.π Read
via "Naked Security".
Naked Security
Get-rich-quick social media scams are turning teens into money mules
Young people are being talked into handing over their bank details with the promise of some easy cash.
β What comes after air gaps? DARPA asks world for ideas β
π Read
via "Naked Security".
According to DARPA, air gapping computers and data is a security idea that has run its course and urgently needs to be replaced.π Read
via "Naked Security".
Naked Security
What comes after air gaps? DARPA asks world for ideas
According to DARPA, air gapping computers and data is a security idea that has run its course and urgently needs to be replaced.
β Secret Service busts online car sales crime ring β
π Read
via "Naked Security".
They posed as military needing to offload cars before deployment, allegedly posting bogus ads on Craigslist, eBay, and AutoTrader.π Read
via "Naked Security".
Naked Security
Secret Service busts online car sales crime ring
They posed as military needing to offload cars before deployment, allegedly posting bogus ads on Craigslist, eBay, and AutoTrader.
β McDonalds app users hatinβ it after being hacked by hungry hamburglars β
π Read
via "Naked Security".
At least two users of the McDonalds mobile app arenβt lovinβ it after thieves hijacked their accounts and ordered hundreds of dollars of food for themselves.π Read
via "Naked Security".
Naked Security
McDonalds app users hatinβ it after being hacked by hungry hamburglars
At least two users of the McDonalds mobile app arenβt lovinβ it after thieves hijacked their accounts and ordered hundreds of dollars of food for themselves.
β You can now unsend messages in Facebook Messenger β
π Read
via "Naked Security".
Facebook Messenger has made available the ability to unsend, or in their words "remove for everyone" your mis-sent messages.π Read
via "Naked Security".
Naked Security
You can now unsend messages in Facebook Messenger
Facebook Messenger has made available the ability to unsend, or in their words βremove for everyoneβ your mis-sent messages.
π How to use SSH to proxy through a Linux jump host π
π Read
via "Security on TechRepublic".
Make your networks more secure by using an SSH to proxy through a jump host from one machine to another.π Read
via "Security on TechRepublic".
TechRepublic
How to use SSH to proxy through a Linux jump host
Make your networks more secure by using an SSH to proxy through a jump host from one machine to another.
π Cryptocurrency-stealing Clipper malware caught in Google Play Store, here's how to avoid it π
π Read
via "Security on TechRepublic".
Cybercriminals are modifying wallet IDs copied to the clipboard in hopes that users will accidentally transfer funds to the wrong account.π Read
via "Security on TechRepublic".
TechRepublic
Cryptocurrency-stealing Clipper malware caught in Google Play Store, here's how to avoid it
Cybercriminals are modifying wallet IDs copied to the clipboard in hopes that users will accidentally transfer funds to the wrong account.
π 5 blockchain terms business leaders need to know π
π Read
via "Security on TechRepublic".
Blockchain technology is critical to business security, according to a Globant report. Here are the important blockchain terms to get accustomed with.π Read
via "Security on TechRepublic".
TechRepublic
5 blockchain terms business leaders need to know
Blockchain technology is critical to business security, according to a Globant report. Here are the important blockchain terms to get accustomed with.
π΄ What the Government Shutdown Teaches Us about Cybersecurity π΄
π Read
via "Dark Reading: ".
As lawmakers face a Friday deadline to prevent the federal government from closing a second time, we examine the cost to the digital domain, both public and private.π Read
via "Dark Reading: ".
Dark Reading
What the Government Shutdown Teaches Us about Cybersecurity - Dark Reading
As lawmakers face a Friday deadline to prevent the federal government from closing a second time, we examine the cost to the digital domain, both public and private.
β Crypto mirror on the wall, whoβs the smartest of them all? β
π Read
via "Naked Security".
Can scientists out-perform sports stars, musicians and politicians in recognition and influence? You bet they can!π Read
via "Naked Security".
Naked Security
Crypto mirror on the wall, whoβs the smartest of them all?
Can scientists out-perform sports stars, musicians and politicians in recognition and influence? You bet they can!
β Managing Enterprise Security After the Data Supernova β
π Read
via "Threatpost | The first stop for security news".
It's futile to try to put the data genie back in the bottle. Next best thing is whole-enterprise data visibility.π Read
via "Threatpost | The first stop for security news".
Threat Post
Managing Enterprise Security After the Data Supernova
It's futile to try to put the data genie back in the bottle. Next best thing is whole-enterprise data visibility.
β First βClipperβ Malware Discovered on Google Play β
π Read
via "Threatpost | The first stop for security news".
A fake MetaMask app is the first instance of this new type of cryptocurrency stealer appearing outside of shady third-party app stores.π Read
via "Threatpost | The first stop for security news".
Threat Post
First βClipperβ Malware Discovered on Google Play
A fake MetaMask app is the first instance of this new type of cryptocurrency stealer appearing outside of shady third-party app stores.
β Exposed: Instagram, OKCupid, Mumsnet All Face Data Concerns β
π Read
via "Threatpost | The first stop for security news".
Three major websites are making data-breach news this week.π Read
via "Threatpost | The first stop for security news".
Threat Post
Exposed: Instagram, OKCupid, Mumsnet All Face Data Concerns
Three major websites are making data-privacy news this week.
π΄ Security Pros Agree Military Should Conduct Offensive Hacking π΄
π Read
via "Dark Reading: ".
But it can't operate in a bubble, a new Washington Post study indicates.π Read
via "Dark Reading: ".
Darkreading
Security Pros Agree Military Should Conduct Offensive Hacking
But it can't operate in a bubble, a new Washington Post study indicates.