Reporting on GDPR Compliance to the Board (English)
- New search for: Pearce, Guy
- New search for: Pearce, Guy
In:
ISACA journal
;
1
;
32-39
;
2019
-
ISSN:
- Article (Journal) / Print
-
Title:Reporting on GDPR Compliance to the Board
-
Contributors:Pearce, Guy ( author )
-
Published in:ISACA journal ; 1 ; 32-39
-
Publisher:
- New search for: Information Systems Audit and Control Association
-
Publication date:2019-01-01
-
Size:8 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 657.450285
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 657.450285 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Information Security Matters: Extra, Extra, Read All About ItRoss, S.J. et al. | 2014
- 3
-
Information Security Matters: Managing Availability in the Multi-Modal EraRoss, Steven J. et al. | 2018
- 4
-
Information Security Matters: A Fundamental QuestionRoss, S.J. et al. | 2011
- 4
-
Information Security Matters: Microwave SoftwareRoss, S.J. et al. | 2015
- 4
-
Information Security Matters: State-on-state CyberconflictsRoss, Steven J. et al. | 2017
- 4
-
Information Security Matters: A Room With MachinesRoss, S.J. et al. | 2012
- 4
-
Information Security Matters: Fifty Years of Information SecurityRoss, Steven J. et al. | 2019
- 4
-
Guest Editorial: Forget the Governance! What to Do When the CEO Says `Get It Done!'Guldentops, E. et al. | 2013
- 5
-
Cloud Computing: Process Automation From the CloudRauscher, J. et al. | 2014
- 5
-
Information Security Matters: Mean TimesRoss, S.J. et al. | 2013
- 6
-
Cloud Computing: Securing Cloud-based ApplicationsMendelsohn, M. / Philipovitch, A. / Welch, W. / Zanella, R. et al. | 2012
- 6
-
IS Audit Basics: Backup and RecoveryCooke, Ian et al. | 2018
- 6
-
Guest Editorial: Monitoring From the Cloud-Insights on DemandCangemi, M.P. et al. | 2015
- 7
-
IS Audit Basics: Assurance Considerations for Ongoing GDPR ConformanceCooke, Ian et al. | 2019
- 7
-
Cloud Computing: Shifting the Focus to Long-term, Value-add Projects With a Cloud EnvironmentPirooz, S. et al. | 2013
- 7
-
IS Audit Basics: Understanding the Cybercrime WaveSingleton, T. et al. | 2014
- 7
-
IT Audit Basics: How the IT Auditor Can Make Substantive Contributions to a Financial AuditSingleton, T.W. et al. | 2011
- 8
-
The NetworkHeikkinen, T. et al. | 2015
- 8
-
IS Audit Basics: Preparing for Auditing New Risk, Part 1Gelbstein, Ed et al. | 2017
- 9
-
IT Audit Basics: Evaluating Access Controls Over DataSingleton, T.W. et al. | 2012
- 10
-
Five Questions WithFeinman, T. et al. | 2011
- 10
-
IT Audit Basics: How to Properly Audit a Client Who Uses a Service Organization-SOC Report or No SOC ReportSingleton, T.W. et al. | 2013
- 10
-
IS Audit Basics: Perspectives From a Seasoned PractitionerGelbstein, E. et al. | 2015
- 12
-
Book Review: IT Governance for CEOs and Members of the BoardEtea, I.K. et al. | 2014
- 12
-
Cloud Computing: Are Your Data Secure in the Cloud?Nye, J. et al. | 2015
- 13
-
Cloudifying Threats—Understanding Cloud App Attacks and DefensesSood, Aditya K. / Jalil, Rehan et al. | 2018
- 13
-
Book Review: Big Data: A Revolution That Will Transform How We Live, Work, and ThinkParekh, U. et al. | 2014
- 14
-
Data Privacy, Data Protection and the Importance of Integration for GDPR ComplianceBrunswick, Dave et al. | 2019
- 14
-
SCADA Cybersecurity FrameworkMalaviya, S. et al. | 2014
- 14
-
Database Backup and Recovery Best PracticesAkhtar, A.N. / Buchholtz, J. / Ryan, M. / Setty, K. et al. | 2012
- 14
-
The Automation ConundrumZongo, Phillimon et al. | 2017
- 16
-
Book Review: IT Governance: A Pocket GuideSule, D. et al. | 2013
- 16
-
Auditing Security Risks in Virtual IT SystemsChaudhuri, A. / von Solms, S.H. / Chaudhuri, D. et al. | 2011
- 16
-
Book Review: Cybersecurity and Cyberwar: What Everyone Needs to KnowMarks, L. et al. | 2015
- 17
-
Book Review: Secure: Insights From the People Who Keep Information SafeKivisild, A.K. et al. | 2015
- 17
-
Governance Implementation-COBIT 5 and ISOMarks, L. et al. | 2013
- 18
-
NIST's New Password Rule BookFulmer, Bachman / Walters, Melissa / Arnold, Bill et al. | 2019
- 18
-
Effective Cyberthreat Management Evolution and BeyondSehgal, S. et al. | 2015
- 19
-
Key Considerations in Protecting Sensitive Data Leakage Using Date Loss Prevention ToolsKumaresan, N. et al. | 2014
- 20
-
Key Issues, Challenges and Resolutions in Implementing Business Continuity ProjectsTammineedi, R.L.S. et al. | 2012
- 22
-
Implementing an Information Security Continuous Monitoring Solution-A Case StudyLuu, T. et al. | 2015
- 22
-
Phishing Detection and Loss Computation Hybrid ModelBiswas, Baidyanath / Mukhopadhyay, Arunabha et al. | 2017
- 23
-
Mistakes Happen! Mitigating Unintentional Data LossVan Stone, Mike / Halpert, Ben et al. | 2018
- 24
-
IT Policy Framework Based on COBIT 5Carrillo, J. et al. | 2013
- 24
-
The Road to GDPR ComplianceBarclay, Corlane et al. | 2019
- 24
-
Effective IT Governance Through the Three Lines of Defense, Risk IT and COBITOyemade, R. et al. | 2012
- 24
-
Challenges and Benefits of Migrating to COBIT 5 in the Strongly Regulated Environment of EU Agricultural Paying AgenciesArcidlacono, G. et al. | 2014
- 26
-
A Young Professional's Guide to Career Success Using Soft SkillsKandra, M. / Sewell, T. / Nyamari, J. et al. | 2011
- 27
-
Auditing for PII Security ComplianceMohammed, D. et al. | 2014
- 28
-
Influence of International Best Practices on the South African Public Service's Corporate Governance of ICTvan der Walt, T. / Coetsee, A.D. / von Solms, S.H. et al. | 2013
- 29
-
User Threats Vs. User PrivacyVlachos, D. et al. | 2015
- 30
-
Applying AI in Application SecurityMaraju, Kiran et al. | 2018
- 30
-
Sponsored Feature: Why Attackers Are Turning Their Attention Toward ERP ApplicationsPerez-Etchegoyen, Juan Pablo et al. | 2019
- 30
-
Information Risk Management for Supporting a Basel II InitiativeDutta, A. / Sista, P. et al. | 2012
- 31
-
Chain Exploitation-Social Networks MalwareSood, A.K. / Enbody, R. et al. | 2011
- 31
-
Sponsored Feature: Indicators of Exposure and Attack Surface VisualizationCircus, Ravid et al. | 2017
- 31
-
Understanding Software Metric UseHenderson, D. / Sheetz, S.D. / Wallace, L. et al. | 2015
- 31
-
Risk Management in 4G LTEBhasker, D. et al. | 2014
- 32
-
Reporting on GDPR Compliance to the BoardPearce, Guy et al. | 2019
- 33
-
Creating the Business Case for ERP System Acquisitions Using GEITZoughbi, G. et al. | 2013
- 36
-
Meeting Security and Compliance Requirements Efficiently With TokenizationBeiseel, S. et al. | 2014
- 37
-
A Machine Learning Approach for Telemedicine GovernancePal, Shounak / Mukhopadhyay, Arunabha et al. | 2017
- 37
-
Big Data Deidentification, Reidentification and AnonymizationKhan, Mohammed J. et al. | 2018
- 38
-
The Devil's in the DetailsDavis, S. / Ferrell, P. / Scranton, S. / Millar, P. et al. | 2012
- 38
-
Auditing SQL Server Databases Using CAATsCooke, I. et al. | 2015
- 38
-
Simplify and Layer Your Security Approach to Protect Card DataHorton, T. et al. | 2011
- 39
-
BYOD Security Considerations of Full Mobility and Third-party Cloud ComputingYu, W.E. et al. | 2013
- 40
-
The Optimal Risk Management FrameworkMarks, Larry et al. | 2019
- 42
-
Privacy Audit-Methodology and Related ConsiderationsRiffat, M. et al. | 2014
- 42
-
The Machine Learning Audit—CRISP-DM FrameworkClark, Andrew et al. | 2018
- 42
-
Incorporating COBIT Best Practices in PCI DSS V2.0 for Effective ComplianceNicho, M. et al. | 2012
- 43
-
IT Governance Implementation-Formulating and Presenting Practical Business CasesBhatia, R. et al. | 2013
- 43
-
Audit Accounting Data Using Excel Pivot TablesFilzen, J.J. / Simkin, M.G. et al. | 2015
- 43
-
Information Security From a Business Perspective: A Lottery Sector Case StudyDimitriadis, C.K. et al. | 2011
- 46
-
Unlocking Hidden Value in ERP System Acquisitions Using Risk ManagementZoughbi, G. et al. | 2014
- 46
-
Smashing the Information Security Policy for Fun and ProfitDavid Eduardo Acosta, R. et al. | 2017
- 46
-
The Four Questions for Successful DLP ImplementationNanchengwa, Christopher et al. | 2019
- 46
-
Building and Maintaining Effective Mechanisms for Implementing IT GovernanceRobinson, I. / Jodha, M. et al. | 2013
- 48
-
Implementation of Big Data in Commercial BanksAkanni, Adeniyi et al. | 2018
- 49
-
The Modernization Problem, Part 1Henry, K. et al. | 2013
- 49
-
Information Security Continuous MonitoringHargenrader, B. et al. | 2015
- 52
-
Crossword PuzzleMellor, M. et al. | 2013
- 52
-
Using Open Source Tools to Support Technology GovernanceMoyle, Ed et al. | 2017
- 52
-
Tools: Data Protection ToolsMoyle, Ed et al. | 2018
- 53
-
CPE Quiz #146 Based on Volume 5, 2012Chan, S. et al. | 2013