Information Security Policies support Compliance
Information Security policies support compliance in many ways. Vicarious liability Beyond sensitising employees to the risks posed by technology, information security policies minimise the...
View ArticleIT Security Podcast
[private]This IT Security Pubcast focuses on matters of information security and risk in South Africa. Part 1: 00:00:00 – 00:11:34 – 1.4MB Speakers are introduced (including Helaine Leggat from...
View ArticleWhat is Information Security Law?
[private]Information security law is an emerging area of the law. There is no single law in South Africa that governs all of a company’s information security obligations. Rather, it comprises a...
View ArticleCurrent trends in information security in South Africa
There are three high water marks in the evolution of a body of “information security law” in South Africa: The King III Report on Governance for South Africa was released on 1 September 2009 The ECT...
View ArticleInfosec Law
This presentation deals with the meaning of security in the South Africa context. It also deals with management of critical databases, privacy (state of SA privacy regulation), monitoring and King II...
View ArticleTop Five Worst Data Security Breaches
Data security breaches seem to be hitting the headlines frequently these days. So, we decided to make a Top Five list of the Worst Data Security Breaches in the world. Each of the data security...
View Article
More Pages to Explore .....