Data Protection: Culture, Tools, People, and Roles
09/06/18 In my previous posts about Building a Culture of Data Protection (Overview, Development, Features, Expectations), I covered the background of building a culture. In this p…
09/06/18 In my previous posts about Building a Culture of Data Protection (Overview, Development, Features, Expectations), I covered the background of building a culture. In this p…
08/23/18 We’ve talked about building a culture, why it applies to all data environments, and some specific types of data protection features you should be considering. Today, we’ll…
08/10/18 As I explained in previous posts on building a culture of data protection, we in the technology world must embrace data protection by design. To Reward, We Must Measure. H…
07/30/18 In my earlier post in this data protection series, I mentioned that data security and privacy is difficult: Building a culture that favours protecting data can be challeng…
07/12/18 Building a culture that favors protecting data can be challenging. In fact, most of us who love our data spend a huge amount of time standing up for our data when it seems…
12/06/17 In this last post of my 5 More Ways I Can Steal Your Data series, I focus on my belief that all data security comes down to empathy. Yes, that one trait that we in technol…
11/27/17 In my recent post 5 More Ways I Can Steal Your Data – Work for You & Stop Working for You I started telling the story of a security guard who helped a just fired contracto…