Violet Sullivan, CIPP/US CIPM

Violet Sullivan, CIPP/US CIPM

Cyber ▪️ Privacy ▪️ AI ▪️ Cyber Insurance ▪️ Adjunct Professor for Baylor Law School

View articles by Violet Sullivan, CIPP/US CIPM

Texas Says “Hold My Beer” to AI Regulation: A Deeper Dive into the Texas Responsible AI Governance Act

Texas Says “Hold My Beer” to AI Regulation:…

October 31, 2024

100 likes9 comments

Cracking Cybersecurity Consulting: How Do We Continuously Improve Our Cybersecurity Program?

Cracking Cybersecurity Consulting: How Do We…

September 30, 2021

33 likes2 comments

Cracking Cybersecurity Consulting: How Do We Put the Consulting Report to Use?

Cracking Cybersecurity Consulting: How Do We…

September 29, 2021

9 likes

Cracking Cybersecurity Consulting: How Do We Understand the Final Deliverable?

Cracking Cybersecurity Consulting: How Do We…

September 28, 2021

14 likes2 comments

Cracking Cybersecurity Consulting: Rules of Engagement, How do we control the impact of the consultant?

Cracking Cybersecurity Consulting: Rules of…

September 23, 2021

29 likes

Cracking Cybersecurity Consulting: How do we protect ourselves from potential security exposure?

Cracking Cybersecurity Consulting: How do we…

September 15, 2021

24 likes2 comments

Cracking Cybersecurity Consulting: How do we protect ourselves throughout the consulting agreement?

Cracking Cybersecurity Consulting: How do we…

August 18, 2021

22 likes3 comments

Cracking Cybersecurity Consulting: How do we negotiate the best price for the project?

Cracking Cybersecurity Consulting: How do we…

July 29, 2021

27 likes2 comments

Cracking Cybersecurity Consulting: How do we properly “vet” the consulting vendor?

Cracking Cybersecurity Consulting: How do we…

July 12, 2021

20 likes2 comments

Cracking Cybersecurity Consulting: When do you need a second opinion?

Cracking Cybersecurity Consulting: When do…

June 24, 2021

17 likes11 comments

Cracking Cybersecurity Consulting: How do we align on project scope?

Cracking Cybersecurity Consulting: How do we…

June 10, 2021

15 likes4 comments

Cracking Cybersecurity Consulting: How Do We Pick a Reputable Cybersecurity Consultant?

Cracking Cybersecurity Consulting: How Do We…

May 27, 2021

26 likes20 comments

Cracking Cybersecurity Consulting: Lifting the Veil

Cracking Cybersecurity Consulting: Lifting…

May 14, 2021

59 likes38 comments

Another State Strengthens Data Protection Laws: Colorado

Another State Strengthens Data Protection…

June 6, 2018

65 likes5 comments

Oregon Strengthens Existing Data Breach Notification Law

Oregon Strengthens Existing Data Breach…

June 1, 2018

20 likes1 comment

Arizona Expands Data Breach Notification Law

Arizona Expands Data Breach Notification Law

May 31, 2018

32 likes2 comments

"Satan" Ransomware Uses Same Vulnerability as WannaCry

"Satan" Ransomware Uses Same Vulnerability…

April 24, 2018

10 likes2 comments

And Then There Were 50… Breach Notification Laws

And Then There Were 50… Breach Notification…

April 4, 2018

17 likes1 comment

South Dakota, 49th State to Enact Breach Notification Law, Alabama Close Behind

South Dakota, 49th State to Enact Breach…

March 23, 2018

25 likes1 comment

Eight New Cyber Threats Every Second: McAfee Report Summary

Eight New Cyber Threats Every Second: McAfee…

March 15, 2018

15 likes

  翻译: