The EU General Data Protection Regulation (GDPR) poses significant obligations to all organizations that process the personal data of EU citizens. For instance, personal data must be deleted when legal grounds do not exist for keeping it. Many organizations face significant challenges to determine which personal data they can keep and for what purpose, especially […]
Transforming your MSP into an MSSP You have a trusted and lengthy relationship with your customers, but now want to expand your business to include the opportunities within the IT Security arena. How do you communicate this without customers feeling you’ve been leaving something off the table in your current offerings? This session will provide […]
Federal contractors have until December 31, 2017 to fully comply with NIST Special Publication 800-171 standards, or risk the loss of existing contracts and disqualification from future opportunities. If you are a contractor who works with the Department of Defense (DoD) or Federal Government and handle Controlled Unclassified Information (CUI), you are required to comply […]
The most important assets modern-day firms possess are the trade secrets and other intellectual property that differentiate your organization from global competition. The loss of this critical, sensitive data through insider attacks, employee negligence or targeted external attacks can have a catastrophic impact on your organizations’ competitiveness and survival. In May of 2016 the Defend Trade […]
Come see us at the RSA Conference #RSAC2017 to get a demo of our new Sienna SecureView dashboard. Call 800-792-6421 or message us @SiennaSecure while you are at the conference to arrange a demo.
On October 2016, IACI convened its inaugural conference in Washington bringing together Government and Industry “Change Agents” to highlight opportunities and collaborate to advance cybersecurity at a more rapid pace through information sharing, coordinated response, and adaption of best practice to operationalize sector-specific cyber resilience supported by education. IACI Delegates will continue their valuable work […]
The “move to the cloud” has long been considered a key initiative by enterprises worldwide. With this move, there’s a level of increased risk that enterprises must address. What’s different is using cloud services requires abdicating some control over how some systems and data are being protected. In May 2016, the Defend Trade Secrets Act […]