Deborah Erlanger
Debra Erlanger is a Cybersecurity Analyst specializing in Governance, Risk, and Compliance (GRC). With a keen focus on cyber risk and compliance, Debra is committed to staying at the forefront of industry developments and continuously expanding her knowledge. She thrives in dynamic environments where she can leverage her strong people, organizational, and IT skills. Debra is known for her effective communication abilities and her dedication to delivering high-quality results.
Deborah Erlanger
Debra Erlanger is a Cybersecurity Analyst specializing in Governance, Risk, and Compliance (GRC). With a keen focus on cyber risk and compliance, Debra is committed to staying at the forefront of industry developments and continuously expanding her knowledge. She thrives in dynamic environments where she can leverage her strong people, organizational, and IT skills. Debra is known for her effective communication abilities and her dedication to delivering high-quality results.
What is the MNDPA?
The Minnesota Data Privacy and Security Act (MNDPA) is a comprehensive state-level privacy law designed to protect…
Essential Eight
What is the Essential Eight? The Essential Eight is a cybersecurity framework developed by the Australian Cyber…
Nebraska Data Privacy Act (NDPA)
What is the Nebraska Data Privacy Act? The Nebraska Data Privacy Act (NDPA) is a state-level privacy…
CJIS v5.9.5
What is CJIS (v5.9.5)? The Criminal Justice Information Services (CJIS) Security Policy v5.9.5 is a comprehensive security…
Kentucky Consumer Data Protection Act (KCDPA)
What is the KCDPA? The Kentucky Consumer Data Protection Act (KCDPA) is a state-level privacy law designed…
Centraleyes Privacy Framework (CPF)
What is the CPF? The Centraleyes Privacy Framework (CPF) is a comprehensive compliance tool designed to help…
Florida Digital Bill of Rights (FDBR)
What is the Florida Digital Bill of Rights (FDBR)? The Florida Digital Bill of Rights (FDBR) is…
Nevada Privacy Act
What is the Nevada Privacy Act? The Nevada Privacy Act (NPA), also referred to as NRS 603A,…
Iowa Consumer Data Protection Act (ICDPA)
What is the Iowa Consumer Data Protection Act (ICDPA)? The Iowa Consumer Data Protection Act (ICDPA) is…
Snowflake Breach Snowballs
In a concerning turn of events, a breach in Snowflake’s cloud storage system has resulted in a…
AI Governance
What is the Centraleyes AI Governance Framework? The AI Governance assessment, created by the Analyst Team at…
Cybersecurity in Sports: A New Arena for Risk Management
In the high-stakes world of professional sports, the action isn’t just on the field. Behind the scenes,…
Cisco Raises Concerns Over Surge in Brute-Force Attacks Targeting VPN and Web Services
Cisco has sounded the alarm on a widespread increase in brute-force attacks targeting various devices, including Virtual…
NIST AI RMF
What is NIST AI RMF? As artificial intelligence gains traction and becomes increasingly more popular, it is…
Navigating the Cyber Currents: Ensuring a Watertight Critical Infrastructure
Addressing recent cyber threats, a top White House national security official emphasized the imperative for increased cybersecurity…
Critical Atlassian Flaw Has a Simple Fix
Atlassian has issued a warning about CVE-2023-22518. The severe flaw is described as an “improper authorization vulnerability…
D.C. Voter Data Leak: What We Know So Far
The District of Columbia Board of Elections (DCBOE) has reported a security incident involving the breach of…