Cybersecurity Leadership
21.0K views | +1 today
Follow
Cybersecurity Leadership
A reference resource for the CIO and the CISO on cyber security, looking beyond the technology horizon into leadership, management, culture, governance, resilience and the real dynamics of security transformation
Curated by JC Gaillard
Your new post is loading...
Your new post is loading...
Scooped by JC Gaillard
Scoop.it!

Cybersecurity should be treated an ESG issue. Here's why

Cybersecurity should be treated an ESG issue. Here's why | Cybersecurity Leadership | Scoop.it
Cyber attacks present a huge risk to companies and ultimately to society. Companies need to stop relying on insurance and manage cybersecurity effectively.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Defining a data privacy strategy in the digital era

Defining a data privacy strategy in the digital era | Cybersecurity Leadership | Scoop.it

Personalized customer experiences, automated business operations, and data science-driven insights all depend on the quality and volume of your data. That’s why your data privacy strategy must be more than a policy on ethics.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

How do you combine ethics and cybersecurity?

How do you combine ethics and cybersecurity? | Cybersecurity Leadership | Scoop.it
After promises of a truce, cyberattacks against hospitals suggest that there is no such thing as ethics among hackers. Really?
No comment yet.
Scooped by JC Gaillard
Scoop.it!

AI & Big Data’s Hoarding Mentality Creates A New Era Of Cyber Risks

AI & Big Data’s Hoarding Mentality Creates A New Era Of Cyber Risks | Cybersecurity Leadership | Scoop.it
Beneath the never-ending headlines about data breaches today is the simple fact that companies are collecting, curating and hoarding ever larger and richer archives of intimate information about their customers.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

GDPR After One Year: Costs and Unintended Consequences

GDPR After One Year: Costs and Unintended Consequences | Cybersecurity Leadership | Scoop.it

GDPR is officially one year old. How have the first 12 months gone? As you can see from the mix of data and anecdotes below, it appears that compliance costs have been astronomical; individual “data rights” have led to unintended consequences; “privacy protection” seems to have undermined market competition; and there have been large unseen — but not unmeasurable! — costs in foregone startup investment. So, all-in-all, about what we expected.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Today’s Businesses Don’t Win on Strategy. They Win on Trust.

Today’s Businesses Don’t Win on Strategy. They Win on Trust. | Cybersecurity Leadership | Scoop.it
The costs for a breach in trust are higher than you think — and they appear to be rising.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

What Can Companies Do to Stop Being The Next “Facebook” Data Breach?

What Can Companies Do to Stop Being The Next “Facebook” Data Breach? | Cybersecurity Leadership | Scoop.it

GDPR should help too clear this up, but in the light of the current Facebook situation companies can no longer ideally sit by and let there employees use data like it’s the “wild west”

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Why Privacy Must Be Baked In To IoT Devices

Why Privacy Must Be Baked In To IoT Devices | Cybersecurity Leadership | Scoop.it
As consumers add more and more connected devices to their personal IoT networks, security and privacy are paramount. These networks are only as secure as their weakest link – which is why Isabelle Noblanc, UL, says organizations making connected devices must practice security and privacy by design. Here’s how Noblanc says organizations must rethink identity management and why it’s time to put control in consumers’ hands.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Research: A Strong Privacy Policy Can Save Your Company Millions

Research: A Strong Privacy Policy Can Save Your Company Millions | Cybersecurity Leadership | Scoop.it

Here are the Fortune 100 companies with the best and worst privacy policies.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

3 reasons why GDPR is not the new Y2K

3 reasons why GDPR is not the new Y2K | Cybersecurity Leadership | Scoop.it

"This is not a box-ticking exercise, but a matter of cultural shift for many firms"

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Why the ethical use of data and user privacy concerns matter

Why the ethical use of data and user privacy concerns matter | Cybersecurity Leadership | Scoop.it
Improve consumer trust by understanding the ethical use of data and privacy concerns that affect users as they interact with your platform.
Katchakid's comment, March 3, 2022 6:16 AM
good
Scooped by JC Gaillard
Scoop.it!

AI Ethics Really Come Down To Security

AI Ethics Really Come Down To Security | Cybersecurity Leadership | Scoop.it
The process required to make ethical AI safe and secure requires more than the coding of virtuous machines.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Privacy: Where Security and Ethics Miss the Mark

Privacy: Where Security and Ethics Miss the Mark | Cybersecurity Leadership | Scoop.it
The unfettered internet has had its day. Going forward, more private companies will be subject to increasingly demanding privacy legislation.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

The True Cost of Data

The True Cost of Data | Cybersecurity Leadership | Scoop.it

Privacy, security and transparency could become a valued differentiator with a proposition aligned with best practice.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Protecting Data Privacy in a Data-Sharing World

Protecting Data Privacy in a Data-Sharing World | Cybersecurity Leadership | Scoop.it
There are compelling reasons for organizations to share data. The challenge is to enable data sharing in a way that protects the privacy of users’ personal information.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Cyber Security: Not just an Equation between Risk, Compliance and Costs

Cyber Security: Not just an Equation between Risk, Compliance and Costs | Cybersecurity Leadership | Scoop.it

Key factors for boards to consider in 2019 around cyber security & privacy: It's now a matter of good governance, good ethics and quite simply good business

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Why Consumers Demand Greater Transparency Around Data Privacy

Why Consumers Demand Greater Transparency Around Data Privacy | Cybersecurity Leadership | Scoop.it
Recent research has shown that while consumers are demanding more transparency around information handling, few companies are doing enough to communicate with their customers about data privacy.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

The internet of things is built to leak

The internet of things is built to leak | Cybersecurity Leadership | Scoop.it
The concept of a private space where we can retreat is at risk of becoming a relic of the past.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

The art of withholding data breaches as showcased by Uber

The art of withholding data breaches as showcased by Uber | Cybersecurity Leadership | Scoop.it
Uber withheld details of the breach for more than a year and paid off hackers and hushed up the sorry tale for it to finally break in November 2017
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Cyber-safety or cyber-maturity? Teaching ethics in a virtual world

Cyber-safety or cyber-maturity? Teaching ethics in a virtual world | Cybersecurity Leadership | Scoop.it
This article was written by Michael Salter Sexting is back in the news for all the wrong reasons. Multiple incidents of teenagers circulating explicit images of other teenagers are under investigation in Victoria. It has emerged that Queensland police have charged 240 children for producing and distributing child pornography so far in 2013. Any minor who takes an erotic image of themselves could technically be charged with child pornography offences, as could the person they send it to – even if the receiver is another minor and they are in a relationship. Australian police have emphasised that they use these laws …
No comment yet.