Call 855-808-4530 or email GroupSales@alm.com to receive your discount on a new subscription.
Professionals in e-discovery and privacy, including lawyers, are hungry for growth opportunities and may be ripe to transition into certain security-centric positions; however, the security job landscape is far more expansive and far less commoditized than ESI or privacy — for now. Part Two provides a road map for how certifications can assist an individual or an organization in reinventing, repurposing, creating or maintaining cybersecurity talents.
In Part One, we delved deep into the value proposition and formidable dominance of the IAPP certification portfolio in privacy as well as ACEDS coupled with Relativity’s certification stack in e-discovery. Certification dominance is much more elusive and the value of certifications far more open to opinion in the information protection and cybersecurity community. Cybersecurity is estimated to become a $170B industry by 2020, eclipsing the projected growth of e-discovery 10 times over. Professionals in e-discovery and privacy, including lawyers, are hungry for growth opportunities and may be ripe to transition into certain security-centric positions; however, the security job landscape is far more expansive and far less commoditized than ESI or privacy — for now.
By Michael Smolenski
It’s clear that the onset of GDPR regulations and a quickly changing consumer sentiment about the sensitivity and value of their personal data will reorient a company’s interactions with their customers and their information. There will be some pain points in this transition, as Facebook investors recently demonstrated, but it doesn’t have to be a unilateral downturn for the tech industry.
By Zach Warren
Gemalto’s 2018 Breach Level Index found 4.5 billion records were stolen, lost or compromised worldwide in the first half of 2018, a 133 increase over the first half of 2017.
By Roy E. Hadley, Jr.
During the time it takes you to read this article, somewhere in the United States, a governmental entity will probably be the victim of a cyber-attack. This article highlights the areas that are most impactful, based on experience in dealing with both large and small cyber-attacks against governments and governmental entities.
By André Bywater and Jonathan Armstrong
This article provides a brief education about where things currently stand in the UK as regards to sanctions and anti-money laundering in the shifting sands of the Brexit process.