Norms
 |
ISO/IEC 27018:2019
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
Source: ISO
|
More information, which may be usefull to you, may be found after login at it-portal.sk
|
• Collection of data and events • Data normalization • Correlation • Log management • Monitoring of users and applications • Audit reporting
Source: it-portal
is a set of policies and procedures for the systematic management of an organization's sensitive data
show all
Japonská agentúra pre vesmírny prieskum (JAXA) tento týždeň informovala, že toto leto zaznamenala kybernetický incident, ktorý pramenil z narušenia Microsoft Active Direc... viac...
show all
Your computer, smartphone, Wi-Fi router and all IT devices must always have the latest versions of operating system updates and patches installed. This also applies t... viac...
Source: KCCKB
Periodically delete saved conversations in discussion forums, SMS and chat applications. They usually contain sensitive personal information.
Source: KCCKB
show all
A specialized center designed primarily to increase the cyber security of the GOVNET network. show link
show all
Vyhláška Národného bezpečnostného úradu, ktorou sa ustanovujú znalostné štandardy v oblasti kybernetickej bezpečnosti show link
Vyhláška Národného bezpečnostného úradu o personálnej bezpečnosti show link
show all
Information security, cybersecurity and privacy protection — Information security management systems — Requirements
Source: ISO
Information technology — Security techniques — Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors
viac...
Source: ISO
show all
Explore innovation, meet industry giants and unlock opportunities – at the world’s largest and most influential connectivity event.
Reasons to be at MWC Barcel... viac...
show link
 Certifications
|
0 |
 Acreditations
|
0 |
Contact us by e-mail
|