Data protection professionals education & certification comparison IAPP & PECB
Identity Underground
by Peter Geelen
2w ago
Crosspost Scope Feedback Important note Certified vs Accredited Certification in GDPR Comparison Chart Company approach and purpose Course & exam comparison Extra online material Experience requirements Exam and maintenance fees Planning your certification roadmap References Download White label version Thank you Crosspost Originally posted on LinkedIN: https://www.linkedin.com/feed/update/urn:li:linkedInArticle:6641236404540108800/ Download: http://blog.cyberminute.com/wp-content/uploads/2024/03/data-protection-certification-track-comparison-IAPP-PECB-final.pdf Full page online art ..read more
Visit website
AI, Cloud & Modern Workplace Conference 2024: red flags and attention points in cloud security audit (watch the security gates) (Part 2/2, the details and solutions)
Identity Underground
by Peter Geelen
1M ago
Introduction Part 1 Presentation collaterals Introduction (p1 & 2) Security = PPT (slide 3-4) Security across the company (slide 5) Management team responsibility (p6) Security controls and measures (p7) Security is a process, continuously changing (p8) How are you doing? (p9) How is your customer or supplier doing? (p10) Monitoring or Audit: what’s the difference ? (p11) Audit types (p12-15) Audit types : internal audit Audit types : 2nd party audit (mutual) Audit types : 3rd party audit (external) Audit main principles (p16) Audit red flags 1. First login with god mode (p17) Hac ..read more
Visit website
AI, Cloud & Modern Workplace Conference 2024: red flags and attention points in cloud security audit (watch the security gates) (Part 1/2)
Identity Underground
by Peter Geelen
1M ago
Source: Event website Main page My session page Presentation published on Youtube Download my slide deck from SlideShare Powerpoint presentation Slide content Other event videos Source: Event website Main page https://aicmwc.azurewebsites.net My session page https://aicmwc.azurewebsites.net/Peter-GEELEN Presentation published on Youtube Download my slide deck from SlideShare Powerpoint presentation Direct link: https://www.slideshare.net/slideshows/red-flags-and-attention-points-in-cloud-security-audit-watch-the-security-gates/266338983 Slide content Other event videos https://www.you ..read more
Visit website
Preparing your audit audience: PowerPoint template to get them ready for an internal audit or external certification audit (incl. practical hints and tips)
Identity Underground
by Peter Geelen
1M ago
Credits In short Audience Typical audit issues to solve with this approach Audit Audience CISO/ISMS Consultant Auditor (internal/external) Purpose of this template Preparation to use the slide deck What’s in the presentation template? 0. Before we start 0.1 Hidden slides 0.2 Slide layout (now anonymous blank) 1. Front page 2. Manual (hidden) 3. Your team in short 4. Team in organigram (visual) 5. Team responsibility & tasks 6&7. Process Turtle (2 versions, hidden) 8. Reference documentation 9. Current tasks & projects 10. Recent changes 11. Important success stories (good n ..read more
Visit website
Outlook life hack: setup Microsoft Outlook signature roaming (redirect your local Outlook signature folder to OneDrive)
Identity Underground
by Peter Geelen
2M ago
Outlook settings roaming Issue: Signature roaming not included in Outlook settings roaming How to setup Outlook signature roaming Find the signature folder on system drive (user profile) Copy the signature file folder content to OneDrive Rename old local signature folder Create Signature folder junction to OneDrive folder What is a junction? Redo – In case of PC reset or another pc or outlook client Important warning for outlook data files References Outlook settings roaming In the new Microsoft Outlook, you can set Cloud storage options to enable roaming for Outlook settings (use the sam ..read more
Visit website
Microsoft Windows 11 quick tip: keep your screen unlocked during demo or audit.
Identity Underground
by Peter Geelen
2M ago
Sometimes it comes handy to block the screensaver or automatic screenlock to keep your screen active for example during a demo or an audit to take notes. While a typical Powerpoint presentation will keep your desktop active, this is not usable during a demo or audit for example. When you want to leave your Windows 11 desktop open and available, there is a quick handy tip you can use. Windows Mobility Center to the rescue. Windows Mobility Center Hit the windows button or search the menu for Windows Mobility center. Check the Presentation Settings , hit the “Turn on” button. To stop, hit the b ..read more
Visit website
Note-to-self: Troubleshooting Microsoft Office language pack download
Identity Underground
by Peter Geelen
3M ago
Background Issue Error message Where you actually should go Background Due to issues with Windows 11, I had to reinstall/reset the system, including Office, nowadays Microsoft 365. Issue As I’m an Dutch speaking Belgian, I’m working with Dutch language documents… No, that’s not the issue. The actual issue: Word started to throw errors on the proofing tools for the Dutch language. Error message “MISSING PROOFING TOOLS: Text in Dutch is not being checked. Do you want to download proofing tools and future updates?” Then it displays a “Download” button, like shown below When you hit the downloa ..read more
Visit website
Note-to-self: some Microsoft default tools you need to reinstall yourself after system reset & rebuild (#Windows11)
Identity Underground
by Peter Geelen
3M ago
Background Quick hint Default apps missing Other apps? Other Windows client DRP hints Background A few weeks ago my Windows 11 laptop lost control over it’s keyboard due to a security update. Pretty sure my keyboard is physically OK, I had to reset my pc, found some time last weekend. After reset my Windows 11 acted normal, even with recent security updates loaded. [Personal note: still need to troubleshoot which Windows update exactly crashed my keyboard drivers beyond reparation. #FUBAR Possible corruption caused by conflict with apps installed. More on this later.] Luckily I had a data ..read more
Visit website
Note-to-self: Status of NIS2 implementation across Europe
Identity Underground
by Peter Geelen
3M ago
This article tries to gather reference material about the implementation of the European #NIS2 directive in the various countries. The content is updated as information comes in. Europe NIS & NIS2 overview National strategy map Digital Strategy CyberSecurity policy Countries (alphabetical) Austria (AT) Belgium (BE) Bulgaria (BG) Germany (DE) France (FR) Ireland (IE) Netherlands (NL) Sources Bird & Bird – NIS2 Tracker EurActive NCTV.nl Europe NIS & NIS2 overview State of play on NIS implementation: https://digital-strategy.ec.europa.eu/en/policies/nis-transposition Nati ..read more
Visit website
Overview of cybersecurity relevant European laws, directives, regulations and policies…
Identity Underground
by Peter Geelen
5M ago
Credits Applicability to your business More info on the list below Difference between EU Directive and EU Regulation EU primary law CFREU (Charter of Fundamental Rights of the EU) ECHR (European Convention of Human Rights) Regulations and directives GDPR Regulation The NIS 2 Directive The NIS 1 Directive (repealed by NIS 2) The Digital Operational Resilience Act (DORA) – Financial sector The Critical Entities Resilience Directive (CER) EU Digital Services Act (DSA) EU Digital Markets Act (DMA) Directive on attacks against information systems European Data Governance Act (DGA) European ..read more
Visit website

Follow Identity Underground on FeedSpot

Continue with Google
Continue with Apple
OR