Innovation with data and AI requires more than just safeguarding privacy risks. Especially when things become complex—where ethics, human rights, and compliance intersect—it is essential that the right people come together and engage in meaningful dialogue. A DPIAMA combines a DPIA and an IAMA, bringing business, development teams, and compliance together at one table.
In our High on AI-podcast, we talk through the real world stories and use cases of business and organizations successfully introducing AI into their everyday work lives, to do all the things AI promises to do, can do and more.
Many organizations worldwide were affected by a serious malfunction on Windows laptops caused by a bug in Crowdstrike's antivirus software. This incident underscores the importance of a robust business continuity management (BCM) plan. Below, the events are discussed and lessons are shared that can help your organization be better prepared for such incidents.
Documents related to the Pfizer/BioNTech vaccine have been published by hackers. These documents were obtained from the European Medicines Agency (EMA) while it was in the process of approving the Pfizer/BioNTech vaccine for the European market. Various media outlets subsequently claimed that a state actor was behind the hack. Whether it was a state actor, a hacking collective or a lone wolf, it is interesting to note that hackers are increasingly targeting the medical sector.
The Network and Information Systems Security Act (Wbni), commonly known as the Cybersecurity Act, aims to enhance digital security in the Netherlands. This Cybersecurity Act is based on the European Union's Network and Information Security Directive (NIS Directive), which encourages member states to improve their digital resilience and collaborate more effectively. The new legislation introduces reporting obligations that organizations must understand and implement.
The Network and Information Systems Security Act (Wbni), commonly known as the Cybersecurity Act, aims to enhance digital security in the Netherlands. This Cybersecurity Act is based on the European Union's Network and Information Security Directive (NIS Directive), which encourages member states to improve their digital resilience and collaborate more effectively.
While the entire Netherlands stands in support of healthcare during these challenging times, there are unfortunately individuals who want to take advantage of the situation. Cybercriminals are deliberately targeting hospitals that are tirelessly combating the coronavirus. They are counting on hospitals having less focus on their information security during these busy times, making them vulnerable.
In many crises plans or business continuity plans, it is stated that teams should exercise annually. Some organizations do this diligently, either due to a strong intrinsic belief in the importance of regular practice or a good routine. However, there are instances when such exercises become an eccentric motivation, as they might be carried out because the regulator, safety authorities, or adherence to a framework mandates it.
The online "meeting jungle" has been a reality for quite some time, and it appears it will remain so for the foreseeable future. Much has changed in the market recently. This update provides a comparison of the "leader" and "challenger" tools according to Gartner, as well as an interesting outsider. The comparison also includes a table with the key features of the discussed meeting tools.