Ingrid Then-Guiraut Archive
Organisations that are serious about preventing data breaches must create an information security policy. They contain a list of guidelines on how to handle with various incidents that might result in data breaches. Ideally, your information security policy should be …
Before beginning your data mapping exercise, you need to identify the personal data you hold. Personal data is any information that can directly or indirectly identify a natural person. The GDPR (General Data Protection Regulation) places much stronger controls on the …
What is cyber risk management? Cyber risk is the identification, analysis and evaluation of cyber risks. It understands and analyses the IT infrastructure, identifies the potential vulnerabilities within different systems, then prioritises the identified risks and makes coordinated efforts to …
Dynamic duo deploy entire suite of risk and compliance products in one contract 27 February 2019 – Information security and compliance specialist Vigilant Software has secured its first major contract through its partnership with managed security expert Cipher. Vigilant Software …
Information security standards such as those developed and published by the ISO (International Organization for Standardization) might not be enshrined in law, but that doesn’t mean they should be viewed as a ‘nice to have’ or an afterthought in your …
Vigilant Software is launching a new series of question-and-answer sessions to help you develop a more in-depth understanding of its privacy and cyber risk software tools. The live 30-minute sessions will provide you with all the information you need to …
New Cloud-based product combines four core modules into a single platform to support GDPR compliance 7th February 2019 – Information security and compliance specialist Vigilant Software has launched GDPR Manager: an entirely Cloud-based platform to help organisations streamline GDPR …
At the beginning of January, Vigilant Software launched a free seven-day trial of its software tools: vsRisk Cloud, the Data Flow Mapping Tool, Compliance Manager, the DPIA Tool and GDPR Manager. A free trial is the best way to understand …
What are your business’s ambitions? Are you hoping to merge with a complementary organisation, or perhaps ultimately be acquired by a bigger player? No doubt you’ve done your research into how to position yourself most attractively. You’ve worked hard to …
Information security is all about protecting your organisation’s information, whether digitally or in hard copy. ISO 27000 – which defines the key terms of ISO 27001, the international standard for information security management – defines information security as the “preservation …