The stakes are too high for organizations not to comply with data privacy regulations,” Bassel Kablawi states in his article, "Why (and How to) Dispose of Digital Data." As the Information Security and Data Privacy Consultant for System Solutions, Bassel Kablawi has the knowledge and experience to determine that the value of data disposal can help an organization protect personal data from being exposed and why the final step in the Data Lifecycle could be considered the most crucial.
Bassel takes us on a deep dive into digital data with ISACA's Safia Kazi on the five stages of data disposal in this ISACA podcast episode. He explains why it is essential to understand that destruction should be performed based on an organization’s retention policy and the five main disposal methods of data, which include date anonymization, data deletion, data crypto shredding (for encrypted data), data degaussing, and data destruction.
Tune in to hear Bassel explain why data destruction is critical to developing digital trust with customers and stakeholders and could save an organization’s reputation.
To read Bassel's article, please visit: www.isaca.org/resources/news-and-trends/industry-news/2022/why-and-how-to-dispose-of-digital-data
To listen to more ISACA Podcasts, please visit: www.isaca.org/podcasts
ISACA Live | Digital Trust Priorities for Privacy and Emerging Tech
Processes of Engagement with Scott Gould
Delivering Security Value to Product Teams Using the Power of Data
AI Ethics and the Role of IT Auditors
Using a Risk-Based Approach to Prioritize Vulnerability Remediation
The True Cost of a Data Breach
2023 IT Compliance and Risk Benchmark Report
What Kind of Glasses Are You Wearing? Your View of Risk May Be Your Biggest Risk of All
How Organizations Can Consistently Reduce Cyberrisk
Key Considerations for Conducting Remote IT Audits
Seven Things to Know Before Automating IT General Control Audits
Understanding, Assessing, Aligning and Transforming Organizational Culture
Topics in Emerging Technology, Governance and Ethics
Industry Spotlight - Julia Kanouse
What Is Your IP Address Cybersecurity IQ? The Role of IP Address Data in a Digital World
The Future of Technology Risk: 4 Ways to Build Stakeholder Trust in the Technology Risk Imperative
Measuring Security Resilience from the Lens of the Adversary Community
Risky Business – Jon Brandt
Building Digital Trust Through Advocacy
Advertising Information Security
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
The Unbelivable Truth - Series 1 - 26 including specials and pilot
Lex Fridman Podcast