T he ICIC is the Â International Conference of Information Commissioners. The Conference was first held in 2003 when Information Commissioners and Ombudsmen met for the first time in Berlin to adopt a declaration for further cooperation and experience sharing among regulatory authorities charged with overseeing the access to public information.
Our friends over at IT Governance have a good intro to the basics. Worth a look...: The data protection landscape was dramatically reshaped with the introduction of the EU GDPR (General Data Protection Regulation) on 25 May 2018, but it wasn't the only law that took effect that day. The UK DPA (Data Protection Act) 2018 also came into force, and although it arrived with much less fanfare than the EU GDPR, it's just as important. In this blog, we explain why the DPA 201
My advice (Disclaimer: I'm not a lawyer) is to use GDPR as your baseline privacy framework then manage the gaps for tricksy places like California...: Companies that do business in California know that it is a magnet for class action litigation. The California Consumer Privacy Act ("CCPA"), a new privacy law that applies to data collected about California residents, will provide even more incentive to plaintiff’s attorneys to bring suit in California. The CCPA was enacte
When Porter wrote about the Competitive Advantage of Nations, GDPR et al weren't even a twinkle in the eye of regulators. There's good reason for nations and organisations to take privacy seriously...: If China doesn't step up its efforts on issues such as data privacy and intellectual property protection, the country could lose out on a 37 trillion yuan ($5.5 trillion) growth opportunity in the decade ahead, according to new analysis. Based on research from economics con
Red Top reporting on this years' ironic hack...: EXTORTIONISTS are feared to have stolen the personal details of 120,000 cops in a malware attack on a computer system. The Police Federation staff association was targeted earlier this month. The crooks deleted databases with members’ names and ranks, email addresses and national insurance numbers. Bank details were also hit, along with confidential information on officers involved in complaints. Credit card details o...
My observation is that, currently, there's always a human behind the attack and humans tend to act the same way even when using new capabilities. Cyber defence is more about psychology than clever tech. Once the AI takes over, that's another matter...: [...] We’ve come a long way since the Love Bug when it comes to improving overall security efforts and addressing cyberthreats. Attackers have also come a long way over the past two decades as their tactics become more sophist
Norsk Hydro seem to be handling this attack is a calm, professional manner...: Aluminium manufacturer Norsk Hydro claims to have found the “root cause” of the global IT outage due to a cyberattack believed to have been caused by LockerGoga, a strain of ransomware that displays some very unusual behaviours, according to Cisco’s Talos Intelligence researchers. Hydro’s worldwide IT network was paralyzed on Tuesday by the attack that started in one of its US operations and fo
This puts the challenges for security researchers in perspective as the planet shifts to IPv6...: [...] Time for a little math. The IPv6 Internet has 2^128 addresses, or 3.4 times 10^38 — an astronomical number. (For comparison, astronomers estimate that there are 2 times 10^23 stars in the universe, which means there are a million billion times more IPv6 addresses than stars.) If it took a single second to scan the entire IPv4 address space, it would take 25 billion bill...
Payroll accounts for the largest chunk of money that moves out of most businesses. Unfortunately, the protections rely on vigilant managers rather than security controls...: The human resources manager tried to be calm and reassuring, but there still was a brief moment of panic: someone, somewhere, had tried to steal Robert’s salary. As anybody with a mortgage knows, missing pay day by just one or two days could cause a lot trouble. The manager had received an email that ...
Notice how the language has changed. It's now about losses, not whether you've been attacked (we all have, even if you don't know it)...: [...] One in five IT decision-makers claimed cyber attackers left no clue to their identity, while 54% said they had faced at least one attack in the past two years that resulted in some sort of disruption, a survey has revealed. This disruption was in the form of service disruption (31%), data integrity issues (18%) and data loss (15%)