IBM OpenPages GRC Services | GRC Consulting – iTechGRC

U.S. Data Protection and Privacy Laws: Federal Updates (Part2)

As states in the U.S. intensify data protection guardrails, efforts escalate at the federal level with new rule proposals, prompt actions, and legal settlements. C-level and data privacy leaders worldwide are actively raising the bar with effective data governance to keep their firms risk-free and compliant with data protection and privacy laws.    iTech GRC’s IBM-certified… Continue reading U.S. Data Protection and Privacy Laws: Federal Updates (Part2)

Rise of Social Engineering: Types of Social Engineering Attacks (Part 2)

After a prelude to the concept of social engineering as an emerging form of cybersecurity attack, let’s explore the different forms your enterprise may likely encounter.    First, let’s have a quick look at some stats on social engineering assaults:   An average business encounters nearly 700 social engineering attacks annually.    50% of social engineering attacks… Continue reading Rise of Social Engineering: Types of Social Engineering Attacks (Part 2)

Unraveling GDPR Requirements and How Some of it Impacts the U.S. (Part 1)

Six years after its enforcement, the European General Data Protection Regulation (GDPR) is now an exclusive industry in the U.S. There are about half a million jobs for data protection officers (DPOs). Companies like Meta, Amazon, and Google are charged with fines worth billions of dollars fines for non-compliance. A takeaway is that GDPR’s extraterritorial… Continue reading Unraveling GDPR Requirements and How Some of it Impacts the U.S. (Part 1)

Does Your Firm Process PII or Sensitive Data? Learn About Data Protection Impact Assessment

Earning customers’ trust is paramount to business success. In today’s data and app-driven digital world, customer data is a currency for brands and businesses of all sizes.  Most organizations process the personal data of individuals on a large scale for business and profit benefits. Recently, many leading tech companies’ data processing activities came under regulatory… Continue reading Does Your Firm Process PII or Sensitive Data? Learn About Data Protection Impact Assessment