Zoom and Class Action

Zooming in on Cyber Governance: Key Areas to Focus On

Advisory Board Member, Jody Westby, CEO of Global Cyber Risk LLC, authored this article which was originally published on July …
Read More
Data scraping and data privacy

Data Scraping Versus Data Privacy: Supreme Court to Decide

Most laws are a matter of trial and error. Data privacy laws are no exception to that rule. The California …
Read More
Privacy Shield

Privacy Shield is Dead: Data Transfers Between EU and US in Question

ADCG wrote earlier this year about the uncertain future of the EU-US Privacy Shield Framework–an agreement between the United States …
Read More
GCPR and CCPA Enforcement

Unforgiving GDPR Enforcement Sets the Tone for CCPA Enforcement

Now that the General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) are fully-enforceable (CCPA enforcement started …
Read More
CMMC Contract Levels

Binary New Cybersecurity Compliance Requirements for Government Contractors

SPECIAL FROM AFFILIATE MEMBER To address increasing cybersecurity risk to government contractors that are defense suppliers (collectively the Defense Industrial …
Read More
Third Party Risk Management

How to Manage Third-Party Risk With Increased Number of Remote Workers

Any compliance officer knows the importance of third-party risk management (TPRM)–and that keeping vendors in compliance with data privacy and …
Read More
CCPA Enforcement

CCPA Enforcement Begins Today–Are You Ready?

Today is the first day the California Consumer Privacy Act (CCPA) will be enforced by the California Attorney General. While …
Read More
/ CCPA, NIST, Privacy

Verizon Releases 2020 Data Breach Investigations Report

DOWNLOAD: Verizon 2020-Data-Breach-Investigations-Report Become a member to access this content …
Read More
data anonymization

How to Anonymize Data

With the California Consumer Privacy Act (CCPA) enforcement date right around the corner, lawsuits citing CCPA have already begun to …
Read More
Zero Trust

Why Your Organization Should Adopt “Zero Trust”

“Trust no one” may be a harsh motto to live by, but when it comes to data privacy and security, …
Read More
/ Cybersecurity, Uncategorized


Back To Top