Category: White Paper

White Paper

The 2018 Cyber Balance Sheet Report

The 2018 Cyber Balance Sheet Report offers a rare window on the state of cyber risk management in the boardroom.
White Paper

A Guide to De-Identification Methods under the GDP…

While the GDPR includes specifics on de-identification methods like pseudonymization and anonymization, individual EU Member States also have their own sets of regulations. Some align with the GDPR, some go beyond, and some fall behind. Our guide helps you stay on top of it all.
White Paper

A Technical Guide to PCI DSS Scoping

A general guide for to PCI DSS scoping trends, misconceptions around encryption and SAQs, and future changes like multi-factor authentication...
White Paper

Rethinking the Identity Risk Equation

An integrated risk management approach can completely change how your organization views and manages identity risk. Our experts dive into how to build a strong identity risk management program that leverages this approach.
White Paper

The GDPR, the APPI, and the DPA

The EU isn't the only one to release new privacy legislation. The Philippines and Japan have recently established stricter privacy requirements, some of which align closely with the principles of the GDPR. Check out our free guide to see where they line up...
White Paper

An Easy-to-Navigate Guide to GDPR Member State Der…

Member state derogations can add a few more steps to the GDPR compliance process. Our guide walks you through what you need to know for each EU member state.
White Paper

The Essential Guide to Workforce Development

A step-by-step guide to building the skills your cyber security team needs to defend against tomorrow's threats...
White Paper

Understanding the Vendor Management Lifecycle

Vendors are often the weakest link in your data chain. Building an effective vendor risk management program is critical, and this guide helps you lay the basic...
White Paper

The 2017 Cyber Balance Sheet Report

The Cyber Balance Sheet Report is a first-of-its-kind study exposing the critical breakdowns that plague cybersecurity professionals and the executives they...