DoD Distribution Statements

Key Takeaways What are DoD Distribution Statements? DoD Distribution Statements are standardized markings used by the U.S. Department of Defense to indicate who may access, share, or reuse a...
doc control procedure

Document Control Procedure

Key Takeaways What Is a Document Control Procedure? A document control procedure is the system an organization uses to manage its official documents from start to finish. It guides...
DAC glossary feature

Discretionary Access Control (DAC)

What is Discretionary Access Control (DAC)?  Discretionary Access Control (DAC) is one of the simplest and most flexible access control methods, but it comes with certain trade-offs. DAC allows...
Data Subprocessor

Data Subprocessor

What is a Data Subprocessor? A Data Subprocessor is a third party engaged by a Data Processor to assist with processing personal data on behalf of a Data Controller....
Due Dilligence

Due Diligence Questionnaire

What is a Due Diligence Questionnaire (DDQ)? When companies evaluate a potential vendor or M&A transaction, they’ll use due diligence processes to uncover risks inherent in the engagement. A...
Data Exfiltration

Data Exfiltration

What Is Data Exfiltration? Data exfiltration is the unauthorized removal or moving of data from or within digital devices. Data exfiltration can happen in two ways: external or internal...
Data Sovereignty

Data Sovereignty

What is Data Sovereignty? Data sovereignty asserts that digital data is subject to the laws of the country in which it is collected. This principle has gained relevance with...
Digital Rights Management

Digital Rights Management

What Are Digital Rights? Digital Rights refer to the permissions and restrictions associated with using digital content, such as text, images, audio, video, and software. These rights are often...
Data Residency

Data Residency

In the digital era, where information traverses borders effortlessly, data residency has emerged as a critical consideration for organizations navigating a complex regulatory landscape. Analogous to residents in a...
Digital Risk Protection

Digital Risk Protection

What are Digital Risk Protection Services? To address the rapidly evolving attack surface on digital and social platforms, digital risk protection platforms (DRPs) are emerging as a new line...
Data Minimization

Data Minimization

The ever-increasing volume and speed of data flowing within your organization introduces opportunities and risks. While this data abundance can be advantageous for decision-making and business growth, it also...
Data Spillage

Data Spillage

What is Data Spillage? NIST defines data spillage as a “security incident that results in the transfer of classified information onto an information system not authorized to store or...
Dynamic Risk Assessment 

Dynamic Risk Assessment 

What is a Dynamic Risk Assessment? Risk assessments, as we know them, are a one-time evaluation of potential risks inherent in a project, institution, or situation. The goal is...
DevSecOps

DevSecOps

What is DevSecOps? DevSecOps is a trend in application security (AppSec) that involves introducing security at the conception of the software development life cycle (SDLC), and continuing secure development...
Digital Risk Management

Digital Risk Management

What is Digital Risk? Digital risk refers to the negative, sometimes unknown, outcomes that stem from adopting new digital technologies. The explosion of digital technology is fueled by its...

Data Security Controls

As work becomes more digitized and connected to the cloud, the risk of cybersecurity threats and attacks grows, and businesses everywhere are looking for ways to protect themselves. IBM’s...
Data Classification Policy

Data Classification Policy

Data classification plays an important role in ensuring that a given enterprise remains in compliance with applicable regulations. Having a data classification policy calls for thoroughly categorizing and storing...
Data Compliance

Data Compliance

Data protection laws are becoming more stringent by the day as the threat of cybercrime has escalated in recent years. Ensuring data compliance should be a top priority for...
Skip to content