Showing 1 - 10 of 176,908
Cybersecurity, data privacy law, and the related legal implications overlap into a relevant and developing area in the legal field. However, many legal practitioners lack the foundational understanding of computer processes which are fundamental for applying existing and developing legal...
Persistent link: https://www.econbiz.de/10012814665
Persistent link: https://www.econbiz.de/10011434075
1. Risk management and cyber risk in the financial services sectors : an overview / Ruth Taplin -- 2. A taxonomy of cyber crime in the financial sector : a comprehensive approach to countermeasures / Monica Lagazio -- 3. Big data analytic tooling and cyber risk management / Cint Kortmann -- 4....
Persistent link: https://www.econbiz.de/10013181977
Chapter 1. Data Sovereignty -- Chapter 2. Digital Governance -- Chapter 3. Conflicts of Law -- Chapter 4. Technical Complexities -- Chapter 5. Comparative Legal Strategies -- Chapter 6. Emerging Topics in Data Sovereignty and Digital Governance.
Persistent link: https://www.econbiz.de/10013406959
Persistent link: https://www.econbiz.de/10014284607
Chapter 1. The Healthcare Environment -- Chapter 2. The Basic of Cybersecurity Concept -- Chapter 3. Defining Cybersecurity in Healthcare -- Chapter 4. Data and Information Security -- Chapter 5. Personal Security -- Chapter 6. Healthcare System and Infra-Security -- Chapter 7. Detection and...
Persistent link: https://www.econbiz.de/10015056761
evaluating a bounty program. Design/methodology/approach This article is divided into three parts: how to design a document … bounty program. The information is presented in narrative form as well as through a series of practical checklists, questions … bounty programs. Originality/value This article includes practical guidance regarding document retention policies, incident …
Persistent link: https://www.econbiz.de/10014893819
This paper delves into the potential impacts of the recently published Network and Information Security Directive 2 (NIS2) and Digital Operational Resilience Act (DORA) on EU cybersecurity resilience and cloud adoption. Employing a mixed method of descriptive literature review, narrative review,...
Persistent link: https://www.econbiz.de/10014514330
Persistent link: https://www.econbiz.de/10015056967
Persistent link: https://www.econbiz.de/10011488360