Data Privacy, Data Protection and the Importance of Integration for GDPR Compliance (English)
- New search for: Brunswick, Dave
- New search for: Brunswick, Dave
In:
ISACA journal
;
1
;
14-17
;
2019
-
ISSN:
- Article (Journal) / Print
-
Title:Data Privacy, Data Protection and the Importance of Integration for GDPR Compliance
-
Contributors:Brunswick, Dave ( author )
-
Published in:ISACA journal ; 1 ; 14-17
-
Publisher:
- New search for: Information Systems Audit and Control Association
-
Publication date:2019-01-01
-
Size:4 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 657.450285
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 657.450285 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 3
-
Information Security Matters: Extra, Extra, Read All About ItRoss, S.J. et al. | 2014
- 3
-
Information Security Matters: Managing Availability in the Multi-Modal EraRoss, Steven J. et al. | 2018
- 4
-
Information Security Matters: A Room With MachinesRoss, S.J. et al. | 2012
- 4
-
Information Security Matters: Fifty Years of Information SecurityRoss, Steven J. et al. | 2019
- 4
-
Information Security Matters: A Fundamental QuestionRoss, S.J. et al. | 2011
- 4
-
Information Security Matters: Microwave SoftwareRoss, S.J. et al. | 2015
- 4
-
Information Security Matters: State-on-state CyberconflictsRoss, Steven J. et al. | 2017
- 4
-
Guest Editorial: Forget the Governance! What to Do When the CEO Says `Get It Done!'Guldentops, E. et al. | 2013
- 5
-
Information Security Matters: Mean TimesRoss, S.J. et al. | 2013
- 5
-
Cloud Computing: Process Automation From the CloudRauscher, J. et al. | 2014
- 6
-
Guest Editorial: Monitoring From the Cloud-Insights on DemandCangemi, M.P. et al. | 2015
- 6
-
IS Audit Basics: Backup and RecoveryCooke, Ian et al. | 2018
- 6
-
Cloud Computing: Securing Cloud-based ApplicationsMendelsohn, M. / Philipovitch, A. / Welch, W. / Zanella, R. et al. | 2012
- 7
-
Cloud Computing: Shifting the Focus to Long-term, Value-add Projects With a Cloud EnvironmentPirooz, S. et al. | 2013
- 7
-
IT Audit Basics: How the IT Auditor Can Make Substantive Contributions to a Financial AuditSingleton, T.W. et al. | 2011
- 7
-
IS Audit Basics: Assurance Considerations for Ongoing GDPR ConformanceCooke, Ian et al. | 2019
- 7
-
IS Audit Basics: Understanding the Cybercrime WaveSingleton, T. et al. | 2014
- 8
-
IS Audit Basics: Preparing for Auditing New Risk, Part 1Gelbstein, Ed et al. | 2017
- 8
-
The NetworkHeikkinen, T. et al. | 2015
- 9
-
IT Audit Basics: Evaluating Access Controls Over DataSingleton, T.W. et al. | 2012
- 10
-
Five Questions WithFeinman, T. et al. | 2011
- 10
-
IS Audit Basics: Perspectives From a Seasoned PractitionerGelbstein, E. et al. | 2015
- 10
-
IT Audit Basics: How to Properly Audit a Client Who Uses a Service Organization-SOC Report or No SOC ReportSingleton, T.W. et al. | 2013
- 12
-
Book Review: IT Governance for CEOs and Members of the BoardEtea, I.K. et al. | 2014
- 12
-
Cloud Computing: Are Your Data Secure in the Cloud?Nye, J. et al. | 2015
- 13
-
Cloudifying Threats—Understanding Cloud App Attacks and DefensesSood, Aditya K. / Jalil, Rehan et al. | 2018
- 13
-
Book Review: Big Data: A Revolution That Will Transform How We Live, Work, and ThinkParekh, U. et al. | 2014
- 14
-
SCADA Cybersecurity FrameworkMalaviya, S. et al. | 2014
- 14
-
The Automation ConundrumZongo, Phillimon et al. | 2017
- 14
-
Data Privacy, Data Protection and the Importance of Integration for GDPR ComplianceBrunswick, Dave et al. | 2019
- 14
-
Database Backup and Recovery Best PracticesAkhtar, A.N. / Buchholtz, J. / Ryan, M. / Setty, K. et al. | 2012
- 16
-
Book Review: IT Governance: A Pocket GuideSule, D. et al. | 2013
- 16
-
Book Review: Cybersecurity and Cyberwar: What Everyone Needs to KnowMarks, L. et al. | 2015
- 16
-
Auditing Security Risks in Virtual IT SystemsChaudhuri, A. / von Solms, S.H. / Chaudhuri, D. et al. | 2011
- 17
-
Book Review: Secure: Insights From the People Who Keep Information SafeKivisild, A.K. et al. | 2015
- 17
-
Governance Implementation-COBIT 5 and ISOMarks, L. et al. | 2013
- 18
-
NIST's New Password Rule BookFulmer, Bachman / Walters, Melissa / Arnold, Bill et al. | 2019
- 18
-
Effective Cyberthreat Management Evolution and BeyondSehgal, S. et al. | 2015
- 19
-
Key Considerations in Protecting Sensitive Data Leakage Using Date Loss Prevention ToolsKumaresan, N. et al. | 2014
- 20
-
Key Issues, Challenges and Resolutions in Implementing Business Continuity ProjectsTammineedi, R.L.S. et al. | 2012
- 22
-
Phishing Detection and Loss Computation Hybrid ModelBiswas, Baidyanath / Mukhopadhyay, Arunabha et al. | 2017
- 22
-
Implementing an Information Security Continuous Monitoring Solution-A Case StudyLuu, T. et al. | 2015
- 23
-
Mistakes Happen! Mitigating Unintentional Data LossVan Stone, Mike / Halpert, Ben et al. | 2018
- 24
-
The Road to GDPR ComplianceBarclay, Corlane et al. | 2019
- 24
-
Effective IT Governance Through the Three Lines of Defense, Risk IT and COBITOyemade, R. et al. | 2012
- 24
-
Challenges and Benefits of Migrating to COBIT 5 in the Strongly Regulated Environment of EU Agricultural Paying AgenciesArcidlacono, G. et al. | 2014
- 24
-
IT Policy Framework Based on COBIT 5Carrillo, J. et al. | 2013
- 26
-
A Young Professional's Guide to Career Success Using Soft SkillsKandra, M. / Sewell, T. / Nyamari, J. et al. | 2011
- 27
-
Auditing for PII Security ComplianceMohammed, D. et al. | 2014
- 28
-
Influence of International Best Practices on the South African Public Service's Corporate Governance of ICTvan der Walt, T. / Coetsee, A.D. / von Solms, S.H. et al. | 2013
- 29
-
User Threats Vs. User PrivacyVlachos, D. et al. | 2015
- 30
-
Applying AI in Application SecurityMaraju, Kiran et al. | 2018
- 30
-
Sponsored Feature: Why Attackers Are Turning Their Attention Toward ERP ApplicationsPerez-Etchegoyen, Juan Pablo et al. | 2019
- 30
-
Information Risk Management for Supporting a Basel II InitiativeDutta, A. / Sista, P. et al. | 2012
- 31
-
Understanding Software Metric UseHenderson, D. / Sheetz, S.D. / Wallace, L. et al. | 2015
- 31
-
Chain Exploitation-Social Networks MalwareSood, A.K. / Enbody, R. et al. | 2011
- 31
-
Sponsored Feature: Indicators of Exposure and Attack Surface VisualizationCircus, Ravid et al. | 2017
- 31
-
Risk Management in 4G LTEBhasker, D. et al. | 2014
- 32
-
Reporting on GDPR Compliance to the BoardPearce, Guy et al. | 2019
- 33
-
Creating the Business Case for ERP System Acquisitions Using GEITZoughbi, G. et al. | 2013
- 36
-
Meeting Security and Compliance Requirements Efficiently With TokenizationBeiseel, S. et al. | 2014
- 37
-
A Machine Learning Approach for Telemedicine GovernancePal, Shounak / Mukhopadhyay, Arunabha et al. | 2017
- 37
-
Big Data Deidentification, Reidentification and AnonymizationKhan, Mohammed J. et al. | 2018
- 38
-
The Devil's in the DetailsDavis, S. / Ferrell, P. / Scranton, S. / Millar, P. et al. | 2012
- 38
-
Auditing SQL Server Databases Using CAATsCooke, I. et al. | 2015
- 38
-
Simplify and Layer Your Security Approach to Protect Card DataHorton, T. et al. | 2011
- 39
-
BYOD Security Considerations of Full Mobility and Third-party Cloud ComputingYu, W.E. et al. | 2013
- 40
-
The Optimal Risk Management FrameworkMarks, Larry et al. | 2019
- 42
-
Incorporating COBIT Best Practices in PCI DSS V2.0 for Effective ComplianceNicho, M. et al. | 2012
- 42
-
Privacy Audit-Methodology and Related ConsiderationsRiffat, M. et al. | 2014
- 42
-
The Machine Learning Audit—CRISP-DM FrameworkClark, Andrew et al. | 2018
- 43
-
IT Governance Implementation-Formulating and Presenting Practical Business CasesBhatia, R. et al. | 2013
- 43
-
Audit Accounting Data Using Excel Pivot TablesFilzen, J.J. / Simkin, M.G. et al. | 2015
- 43
-
Information Security From a Business Perspective: A Lottery Sector Case StudyDimitriadis, C.K. et al. | 2011
- 46
-
Building and Maintaining Effective Mechanisms for Implementing IT GovernanceRobinson, I. / Jodha, M. et al. | 2013
- 46
-
Unlocking Hidden Value in ERP System Acquisitions Using Risk ManagementZoughbi, G. et al. | 2014
- 46
-
Smashing the Information Security Policy for Fun and ProfitDavid Eduardo Acosta, R. et al. | 2017
- 46
-
The Four Questions for Successful DLP ImplementationNanchengwa, Christopher et al. | 2019
- 48
-
Implementation of Big Data in Commercial BanksAkanni, Adeniyi et al. | 2018
- 49
-
The Modernization Problem, Part 1Henry, K. et al. | 2013
- 49
-
Information Security Continuous MonitoringHargenrader, B. et al. | 2015
- 52
-
Crossword PuzzleMellor, M. et al. | 2013
- 52
-
Using Open Source Tools to Support Technology GovernanceMoyle, Ed et al. | 2017
- 52
-
Tools: Data Protection ToolsMoyle, Ed et al. | 2018
- 53
-
CPE Quiz #146 Based on Volume 5, 2012Chan, S. et al. | 2013