Thank you Wojciech Wiewiorowski for an interesting conversation about fascism, communism, European politics, and the potential impacts on data protection/ and privacy. I was happy to write a dedication in my “Philosophy of Cybersecurity” book. In turn, thank you for yours in "Two decades of data protection. What next?"! #cybersecurity #dataprotection #privacy #books #book #author #policy
Lukasz Olejnik, Ph.D, LL.M’s Post
More Relevant Posts
-
Thrilled to share my NIS 2 expertise at ESET Security Days Conference! Slovakia is awaiting the transposition of the NIS 2 Directive, which will impact cybersecurity requirements for entities concerned. Do you have questions about how NIS 2 might affect your organization? I'm here to help with my experience in this field. Feel free to reach out for a consultation! #NIS2 #cybersecurity #law #directive
To view or add a comment, sign in
-
Director and COO @BH Consulting/ Author of The Privacy Leader Compass/ EDPB's expert pool /Top 100 Women In Cyber /Expert in building privacy into the ESG suite/ Speaker, Author.
Attention Privacy Professionals! Privacy Bytes from our book "The Privacy Leader Compass" is back! After a crazy busy Q1, we're returning this week with more insights on #privacy, #cybersecurity, #dataprotection, and more. These snippets not only provide insights into the content of The Privacy Leader Compass, but also clarity where confusion may exist. When I am faced with lack of clarity, my inner academic always needs to find definitions - so I try in these snippets to provide that clarity through definitions and explanations. And don't forget to follow for more updates! #RSAC #sheleadstech #bhconsulting #privacybytes #privacy #dataprotection #AIgovernance
To view or add a comment, sign in
-
📣 Last week the California Privacy Protection Agency published the draft regulations for cybersecurity audits and risk assessments. ❗ Organizations processing the data of California residents, and those doing business with them are advised to pay attention as these future regulations will significantly impact how they have secure data! 👓 A link to a first review of how these regulations will impact your data security in the comments!
To view or add a comment, sign in
-
Cyber Security Consultant | Lawyer | CEH | Trainer | Industrial Control Systems | DFE | Compliance | Assurance | Governance {Bridging the gap between cybersecurity and Law}
"Cybersecurity is much more than a matter of IT." - Stephane Nappo Today's presentation at BSides Nairobi highlighted the gap between cybersecurity and the law with a focus on ethical hackers. Educating ethical hackers about applicable laws is vital for responsible cybersecurity. This knowledge ensures their activities align with legal standards, preventing inadvertent legal issues. It fosters transparent collaboration with organizations and promotes a culture of ethical conduct, contributing to the overall trustworthiness of cybersecurity practices.
To view or add a comment, sign in
-
Throughout summer of last year, I completed a research project into the privacy implications of the draft 'Online Safety Bill'. This identified key shortcomings with the bill: creating cybersecurity threats and undermining privacy rights. I am thrilled to announce that this research has been accepted to the British Conference of Undergraduate Research! I am excited to present this research before an audience, and look forward to networking with fellow undergraduate researchers. #bcur #bcur24 #onlinesafetyact #onlinesafetybill #cybersecurity #privacy
To view or add a comment, sign in
-
Immigration professionals, we want to hear from you! Kelcey Baker and I are working on some new ways to deliver practical training and continuing education resources—packaged specifically for immigration professionals and our teams. First up: cybersecurity 🔐 We’d love to hear from you—what types of digital security and data privacy resources would be most helpful? Let us know through a 5-minute survey in the comments!👇
To view or add a comment, sign in
-
CIO | CTO | Digital and Technology Transformation | Integrated Business Solutions | Generative AI | Strategic Roadmaps | Revenue Generation | Increasing Profits | Empathetic and Collaborative Leader
The ability of organizations to navigate data privacy and comply with data protection laws is hampered by a lack of understanding and budgetary constraints, according to a report by ISACA. The study revealed that more than 57% of cyber professionals lack trust in their organization's privacy team's ability to ensure data privacy. The root cause of this issue is the lack of understanding of the privacy regulations organizations must comply with, as 66% of professionals admitted to this. Organizations need to invest in training and education to ensure that their employees understand the privacy regulations they need to comply with and take the necessary steps to protect sensitive data. #DataProtection #DigitalStrategy #EmployeeEducation #DataPrivacy #Cybersecurity
To view or add a comment, sign in
-
A look at CPPA's draft cybersecurity regulation: The California Privacy Protection Agency's proposed California Privacy Rights Act regulations concerning risk assessments and cybersecurity audits would "effectively impose major cybersecurity requirements on covered businesses," Stanford Cyber Policy Center Senior Advisor James Dempsey writes. Though a lot "remains to be worked out" before finalization, he said "it is clear a lot of thought went into the CPPA drafts, and the final product is likely to retain their essence." Full story #dataprotection #dataprivacy #privacy
To view or add a comment, sign in
-
🔒💡 Dive into Data Privacy: Pseudonymization vs. Anonymization! Learn how these techniques balance data utility and privacy. Ready to strengthen your privacy defenses and enhance data protection? Explore further! 🔗 Discover more: ☑ Social engineering: https://koji.to/k/8Myz ☑ OWASP: https://koji.to/k/8z1c #DataPrivacy #Pseudonymization #Anonymization #CyberSecurity #InfoSec #PrivacyProtection #TakeActionNow #StayProtected #ExploreOpportunities #StayInformed
Which is better pseudonymization or anonymization?
To view or add a comment, sign in