Artwork

Inhalt bereitgestellt von Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant. Alle Podcast-Inhalte, einschließlich Episoden, Grafiken und Podcast-Beschreibungen, werden direkt von Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant oder seinem Podcast-Plattformpartner hochgeladen und bereitgestellt. Wenn Sie glauben, dass jemand Ihr urheberrechtlich geschütztes Werk ohne Ihre Erlaubnis nutzt, können Sie dem hier beschriebenen Verfahren folgen https://de.player.fm/legal.
Player FM - Podcast-App
Gehen Sie mit der App Player FM offline!

CCT 104: Navigating Transborder Data Flows in Cybersecurity and the CISSP (Domain 1.5)

41:54
 
Teilen
 

Manage episode 394026498 series 3464644
Inhalt bereitgestellt von Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant. Alle Podcast-Inhalte, einschließlich Episoden, Grafiken und Podcast-Beschreibungen, werden direkt von Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant oder seinem Podcast-Plattformpartner hochgeladen und bereitgestellt. Wenn Sie glauben, dass jemand Ihr urheberrechtlich geschütztes Werk ohne Ihre Erlaubnis nutzt, können Sie dem hier beschriebenen Verfahren folgen https://de.player.fm/legal.

Send us a Text Message.

Cybersecurity isn't just about technology; it's a battleground where legal expertise and international laws become as crucial as firewalls and encryption. Brace yourself as we navigate the tumultuous waters of cyber attacks, from the shocking breaches in Kansas and Australia to the alarming targeting of US infrastructure by Iranian hackers. Our conversation isn't just a rundown of threats; it's an essential guide through the labyrinth of legal consequences for those at the keyboard's dark side, the life-altering dangers of 'swatting', and the pivotal role legal teams play when digital walls are breached. If you've ever wondered about the balance between sharing information and protecting an organization's reputation during a crisis, this episode lays it bare with the precision of a scalpel.
Transparency and privacy—two sides of the same coin that can make or break trust in this digital era. We explore the intricate dance between these two forces within the context of a 12-week year strategy that reshapes how cybersecurity goals are pursued. You'll get insider tactics on breach notification, navigating the choppy seas of transborder data flows, and adhering to a mélange of international privacy laws. For those who hold the keys to sensitive data, we dissect the importance of data classification and the ethical impetus to uphold privacy, all while ensuring that the data complies with the variegated tapestry of global regulations from GDPR to CCPA.
As we gear up to close the curtain on this episode, we shift our focus to empowering cybersecurity professionals with the knowledge and skills to not just pass the CISSP exam, but to thrive in their careers. Whether through self-study programs or the personalized touch of one-on-one training options, cybertraining.com stands ready to equip you for the challenges that lie ahead. Join us on this journey to fortify our defenses against the cyber threats lurking in the shadows, ensuring that our digital future is secured by the best in the business.

Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!

  continue reading

Kapitel

1. Cybersecurity Concerns and Transborder Data Flows (00:00:00)

2. Legal Implications of Cybercrimes and Breaches (00:05:59)

3. Cybersecurity Incidents (00:16:49)

4. Priority and Privacy in Goal Setting (00:25:18)

5. Considerations for Cross Border Data Transfers (00:33:48)

6. Self-Study Programs for CISSP Certification (00:40:18)

153 Episoden

Artwork
iconTeilen
 
Manage episode 394026498 series 3464644
Inhalt bereitgestellt von Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant. Alle Podcast-Inhalte, einschließlich Episoden, Grafiken und Podcast-Beschreibungen, werden direkt von Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur, Shon Gerber, VCISO, CISSP, and Cybersecurity Consultant oder seinem Podcast-Plattformpartner hochgeladen und bereitgestellt. Wenn Sie glauben, dass jemand Ihr urheberrechtlich geschütztes Werk ohne Ihre Erlaubnis nutzt, können Sie dem hier beschriebenen Verfahren folgen https://de.player.fm/legal.

Send us a Text Message.

Cybersecurity isn't just about technology; it's a battleground where legal expertise and international laws become as crucial as firewalls and encryption. Brace yourself as we navigate the tumultuous waters of cyber attacks, from the shocking breaches in Kansas and Australia to the alarming targeting of US infrastructure by Iranian hackers. Our conversation isn't just a rundown of threats; it's an essential guide through the labyrinth of legal consequences for those at the keyboard's dark side, the life-altering dangers of 'swatting', and the pivotal role legal teams play when digital walls are breached. If you've ever wondered about the balance between sharing information and protecting an organization's reputation during a crisis, this episode lays it bare with the precision of a scalpel.
Transparency and privacy—two sides of the same coin that can make or break trust in this digital era. We explore the intricate dance between these two forces within the context of a 12-week year strategy that reshapes how cybersecurity goals are pursued. You'll get insider tactics on breach notification, navigating the choppy seas of transborder data flows, and adhering to a mélange of international privacy laws. For those who hold the keys to sensitive data, we dissect the importance of data classification and the ethical impetus to uphold privacy, all while ensuring that the data complies with the variegated tapestry of global regulations from GDPR to CCPA.
As we gear up to close the curtain on this episode, we shift our focus to empowering cybersecurity professionals with the knowledge and skills to not just pass the CISSP exam, but to thrive in their careers. Whether through self-study programs or the personalized touch of one-on-one training options, cybertraining.com stands ready to equip you for the challenges that lie ahead. Join us on this journey to fortify our defenses against the cyber threats lurking in the shadows, ensuring that our digital future is secured by the best in the business.

Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!

  continue reading

Kapitel

1. Cybersecurity Concerns and Transborder Data Flows (00:00:00)

2. Legal Implications of Cybercrimes and Breaches (00:05:59)

3. Cybersecurity Incidents (00:16:49)

4. Priority and Privacy in Goal Setting (00:25:18)

5. Considerations for Cross Border Data Transfers (00:33:48)

6. Self-Study Programs for CISSP Certification (00:40:18)

153 Episoden

Minden epizód

×
 
Loading …

Willkommen auf Player FM!

Player FM scannt gerade das Web nach Podcasts mit hoher Qualität, die du genießen kannst. Es ist die beste Podcast-App und funktioniert auf Android, iPhone und im Web. Melde dich an, um Abos geräteübergreifend zu synchronisieren.

 

Kurzanleitung