Cybersecurity / Privacy regulations

Weekly Cybersecurity / Privacy regulations Insights

Stay ahead with our expertly curated weekly insights on the latest trends, developments, and news in Cybersecurity - Privacy regulations.

Recent Articles

Sort Options:

Beyond the checklist: why a data privacy culture outperforms policy every time

Beyond the checklist: why a data privacy culture outperforms policy every time

Organizations must prioritize data protection as a shared responsibility, not just a compliance issue. Effective training and a strong culture of understanding the 'why' behind policies are essential for mitigating risks and maintaining trust in today's data-driven landscape.


What does it mean to have a 'data privacy culture' beyond just following policies?
A data privacy culture means embedding the understanding and importance of data protection into the everyday mindset and behaviors of all employees, not just adhering to formal policies or compliance checklists. It involves leadership communicating the 'why' behind data protection, continuous role-specific training, and encouraging open discussions about data privacy risks and decisions, making data protection a shared responsibility across the organization.
Sources: [1]
Why is leadership important in building a strong data privacy culture?
Leadership is crucial because it sets the tone and priority for data privacy within the organization. When executives clearly communicate the value of data protection and integrate it into business decisions, it signals to all employees that privacy is a core organizational value. This top-down commitment helps foster a shared sense of accountability and vigilance, which is essential for reducing risks and maintaining customer trust.
Sources: [1], [2]

25 July, 2025
TechRadar

New York Seeking Public Opinion on Water Systems Cyber Regulations

New York Seeking Public Opinion on Water Systems Cyber Regulations

New York is seeking public input on proposed cyber regulations for water systems, focusing on incident reporting, response plans, cybersecurity controls, and compliance training. This initiative aims to enhance the security and resilience of critical water infrastructure.


What types of water systems are affected by the proposed cybersecurity regulations in New York?
The proposed regulations apply to water and wastewater utilities in New York State that serve more than 3,300 people. Larger utilities serving over 50,000 customers have additional requirements, such as designating a cybersecurity program leader and implementing network monitoring and logging.
Sources: [1], [2]
What are the key cybersecurity requirements proposed for water and wastewater utilities in New York?
The key requirements include implementing cybersecurity incident response plans, reporting incidents to the Department of Health within 24 hours, conducting annual cybersecurity vulnerability assessments, establishing formal cybersecurity programs, ensuring network monitoring and logging, and providing mandatory cybersecurity training for certified wastewater operators.
Sources: [1], [2]

24 July, 2025
SecurityWeek

Compliance is evolving — Is your resilience ready?

Compliance is evolving — Is your resilience ready?

The evolving role of privacy professionals now encompasses cyber security compliance, driven by new regulations like NIS2 and DORA. These changes demand enhanced resilience and risk management, highlighting the importance of strategic security solutions in today's complex IT landscape.


What are the main differences between NIS2 and DORA regulations?
NIS2 is a directive aimed at strengthening cybersecurity across a broad range of essential and important sectors such as energy, healthcare, and transport, focusing on risk management, incident reporting, and governance. DORA is a regulation specifically targeting the financial sector, emphasizing operational resilience through rigorous ICT risk management, resilience testing, and incident reporting. While NIS2 sets broader cybersecurity objectives, DORA mandates more prescriptive and detailed requirements, including annual security testing and specific incident reporting timelines. DORA also overrides NIS2 in overlapping areas for entities subject to both regulations.
What are the incident reporting requirements under NIS2 and DORA?
Both NIS2 and DORA require organizations to report cybersecurity incidents in multiple stages, but their timelines and definitions differ. Under NIS2, entities must notify authorities within 24 hours of becoming aware of an incident, provide a detailed report within 72 hours, and submit a final report within one month. DORA also requires three reports but allows more flexible deadlines set by competent authorities, focusing on incidents that impact critical or important financial services. The definitions of reportable incidents vary, with NIS2 having a broader scope and DORA focusing on major ICT-related incidents affecting financial sector functions.

18 July, 2025
TechRadar

Safeguarding Customer Information Policy

Safeguarding Customer Information Policy

A new policy outlines essential standards for safeguarding customers' proprietary and consumer information. This customizable six-page document provides expert guidance on security responsibilities, awareness, and training programs to enhance cybersecurity measures effectively.


What are the key components of a reasonable information security program under a safeguarding customer information policy?
A reasonable information security program typically includes strong authentication and access controls such as multi-factor authentication, data masking and anonymization techniques like tokenization and pseudonymization, employee training and awareness programs, and procedures to protect against unauthorized access or data breaches. It also involves regular updates to security measures to keep pace with evolving technology and threats.
Sources: [1], [2]
Who is required to comply with safeguarding customer information policies and what are their responsibilities?
Entities covered by safeguarding customer information policies, such as financial firms under SEC Regulation S-P or businesses subject to the FTC Safeguards Rule, must implement safeguards to protect customer information. Their responsibilities include maintaining security and confidentiality of customer data, protecting against anticipated threats, providing privacy notices to customers, and reporting certain data breaches. They must also develop identity theft prevention programs and ensure employee training on security practices.
Sources: [1], [2]

26 June, 2025
Cybersecurity | TechRepublic

An unhandled error has occurred. Reload 🗙