<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Chrysa Natsopoulou</title>
    <description>The latest articles on Forem by Chrysa Natsopoulou (@cnatsopoulou).</description>
    <link>https://forem.com/cnatsopoulou</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1246530%2F49161fa4-715d-4fa1-9030-834308621ad2.jpg</url>
      <title>Forem: Chrysa Natsopoulou</title>
      <link>https://forem.com/cnatsopoulou</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/cnatsopoulou"/>
    <language>en</language>
    <item>
      <title>Already ISO 27001 certified? Discover how easily you can achieve ISO 9001!</title>
      <dc:creator>Chrysa Natsopoulou</dc:creator>
      <pubDate>Mon, 16 Sep 2024 10:55:14 +0000</pubDate>
      <link>https://forem.com/cnatsopoulou/already-iso-27001-certified-discover-how-easily-you-can-achieve-iso-9001-5hbl</link>
      <guid>https://forem.com/cnatsopoulou/already-iso-27001-certified-discover-how-easily-you-can-achieve-iso-9001-5hbl</guid>
      <description>&lt;p&gt;Are you already ISO 27001 certified and considering ISO 9001 certification? Leveraging your existing management system can significantly simplify the process. Let's explore how to build on your ISO 27001 foundation to achieve ISO 9001 certification efficiently! &lt;/p&gt;

&lt;h2&gt;
  
  
  Understanding ISO 9001 and ISO 27001
&lt;/h2&gt;

&lt;p&gt;ISO 27001 is centered around Information Security Management System (ISMS), aiming to protect information assets. &lt;/p&gt;

&lt;p&gt;On the other hand, ISO 9001 is a globally recognized standard for Quality Management Systems (QMS). It helps organizations of all sizes and sectors improve their performance, meet customer expectations and demonstrate their commitment to quality. Its requirements define how to establish, implement, maintain, and continually improve a QMS. Within the ISO 9000 family, which defines 7 &lt;a href="https://www.iso.org/files/live/sites/isoorg/files/store/en/PUB100080.pdf" rel="noopener noreferrer"&gt;quality management principles&lt;/a&gt; including a strong customer focus and continual improvement, ISO 9001 is the only standard that can be certified to. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;em&gt;But why should an organization pursue ISO 9001 certification?&lt;/em&gt;&lt;/strong&gt; 🤔&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fphvsovod2vo3rwf5mxou.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media.dev.to/cdn-cgi/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fphvsovod2vo3rwf5mxou.png" alt="Image description" width="581" height="405"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;▸ Customer Satisfaction&lt;/strong&gt;: Being compliant with ISO 9001 means that you understand your customers' needs and reduce errors. So you can increase customer confidence in your ability to deliver services.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;▸ Better Supplier Relationships&lt;/strong&gt;: Using best-practice processes contributes to more efficient supply chains, and better collaboration. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;▸ Winning Contracts&lt;/strong&gt;: As the ISO 9001 is recognized globally and can increase the organization's reputation, clients is more likely to stick around.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;▸ Cost Savings&lt;/strong&gt;: You can reduce costs by following industry best practices and focusing on quality.&lt;/p&gt;

&lt;h2&gt;
  
  
  Common Elements between ISO 9001 and ISO 27001
&lt;/h2&gt;

&lt;p&gt;While the focus areas of ISO 27001 &amp;amp; ISO 9001 differ, both standards share several common elements that can be leveraged to streamline the certification process. There are a lot of similarities between ISO 9001 and ISO 27001 that can be accomplished together.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;✓ Context of the Organization&lt;/strong&gt; - Both standards require organizations to identify and define the internal &amp;amp; external factors that impact them, including values, culture, resources and regulations. Additionally, organizations must recognize the interested parties, such as customers, suppliers, employees, and regulatory bodies. &lt;br&gt;
&lt;strong&gt;✓ Allocation Process&lt;/strong&gt; - Both standards require businesses to assign owners to execute different duties of the compliance process. Although the roles and responsibilities within the QMS and ISMS differ, they must both be clearly defined. &lt;br&gt;
&lt;strong&gt;✓ Competence, Awareness, Communication and Document Control&lt;/strong&gt; - These requirements are not only common to ISO 9001 and ISO 27001 but also to other standards. They can be addressed simultaneously and using similar approaches.&lt;br&gt;
&lt;strong&gt;✓ Measurement and Monitoring&lt;/strong&gt; - Both standards require organizations to continuously monitor their business systems to ensure that the desired levels of efficiency are consistently achieved. Also, organizations must follow a systematic process of assessing and quantifying various aspects to ensure that the requirements and objectives are met.&lt;br&gt;
&lt;strong&gt;✓ Internal Audits and Management Review&lt;/strong&gt; - While the audit requirements and the inputs &amp;amp; outputs of reviews differ, the process of conducting them remains the same. &lt;br&gt;
&lt;strong&gt;✓ Nonconformity and Corrective Action&lt;/strong&gt; - The process of managing nonconformities and corrective actions can be identical for both standards, so there is no need to distinguish between  them.&lt;/p&gt;

&lt;h2&gt;
  
  
  Specific Requirements for ISO 9001
&lt;/h2&gt;

&lt;p&gt;While there are several commonalities, ISO 9001 has specific requirements including a strong focus on customer satisfaction, and comprehensive risk management related to product and service quality. In contrast, ISO 27001 primarily focuses on managing information security risks.&lt;/p&gt;

&lt;h2&gt;
  
  
  Steps to Transition from ISO 27001 to ISO 9001
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;1️⃣ Gap analysis&lt;/strong&gt;&lt;br&gt;
Conduct a gap analysis to identify areas where your current ISO 27001 management system meets ISO 9001 requirements and where additional work is needed.&lt;br&gt;
&lt;strong&gt;2️⃣ Document the processes&lt;/strong&gt;&lt;br&gt;
Develop and document the necessary processes and procedures specific to ISO 9001. A process is a set of activities that uses resources to transform inputs into outputs. The ISO 9001 is based on a process approach. Processes must have defined objective(s), input(s), output(s), tools or resources that are required, and ideally, a flowchart. &lt;br&gt;
&lt;strong&gt;3️⃣ Training&lt;/strong&gt;&lt;br&gt;
Ensure your team is trained on the new requirements and understands their roles in the QMS.&lt;br&gt;
&lt;strong&gt;4️⃣ Implementation&lt;/strong&gt;&lt;br&gt;
Implement the new requirements, integrating them with your existing management system.&lt;br&gt;
&lt;strong&gt;5️⃣ Internal audits&lt;/strong&gt;&lt;br&gt;
Conduct internal audits to ensure compliance with ISO 9001 standard.&lt;br&gt;
&lt;strong&gt;6️⃣ Management review&lt;/strong&gt;&lt;br&gt;
Perform a management review to assess the effectiveness of the QMS and make necessary adjustments.&lt;br&gt;
&lt;strong&gt;7️⃣ Certification audit&lt;/strong&gt;&lt;br&gt;
Engage with a certification body to conduct the ISO 9001 certification audit.&lt;/p&gt;

&lt;p&gt;Achieving ISO 9001 certification may seem daunting, but by leveraging your existing ISO 27001 management system, you can streamline the process. Focus on the specific requirements of ISO 9001, conduct thorough gap analysis, and ensure your team is well-prepared. With these steps, you'll be well on your way to enhancing your organization's quality management and customer satisfaction. &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;"Quality is everyone's responsibility"&lt;br&gt;
 &lt;strong&gt;W. Edwards Deming&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>iso27001</category>
      <category>iso9001</category>
      <category>cybersecurity</category>
      <category>grc</category>
    </item>
    <item>
      <title>Celebrating Data Privacy International Day!</title>
      <dc:creator>Chrysa Natsopoulou</dc:creator>
      <pubDate>Sun, 28 Jan 2024 14:26:51 +0000</pubDate>
      <link>https://forem.com/cnatsopoulou/celebrating-data-privacy-international-day-11o5</link>
      <guid>https://forem.com/cnatsopoulou/celebrating-data-privacy-international-day-11o5</guid>
      <description>&lt;p&gt;&lt;em&gt;The &lt;a href="https://staysafeonline.org/"&gt;National Cybersecurity Alliance&lt;/a&gt; (NCA) has themed Data Privacy Day 2024 as "Take Control of Your Data".&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;As we commemorate Data Privacy Day, a global initiative dedicated to raising awareness about the importance of safeguarding private information, we recognize the increasing need for individuals, not just professionals, to prioritize their online privacy. This private information, called sensitive data, includes things like your name, address, birthdate, race, gender, contact details, credit card number, ID card number, medical history, IP address, or location. In a world where technology intertwines with our daily lives, understanding and implementing data privacy measures is crucial for everyone. &lt;/p&gt;

&lt;p&gt;This blog post aims to empower users of all backgrounds with practical tips, ensuring that the protection of personal data becomes an accessible practice for everyone, regardless of their level of technical expertise. Let's explore simple yet effective strategies to fortify our online privacy in this digital age!&lt;/p&gt;

&lt;h2&gt;
  
  
  A brief reflection on this day 🗓️
&lt;/h2&gt;

&lt;p&gt;Data Privacy Day, known in Europe as Data Protection Day, is an international event that occurs every year on 28 January. The purpose of Data Privacy Day is to raise awareness and promote privacy and data protection best practices.&lt;br&gt;
So on 28th of January, governments, parliaments, and organizations work together to spread awareness about the importance of protecting personal data and privacy rights. They might run campaigns for the public, organize educational projects for teachers and students, open their doors for visits to data protection agencies, and host conferences.&lt;br&gt;
The day was initiated by the Council of Europe to be first held in 2007 as the European Data Protection Day. Two years later, on 26 January 2009, the &lt;a href="https://en.wikipedia.org/wiki/United_States_House_of_Representatives"&gt;United States House of Representatives&lt;/a&gt; passed House Resolution HR 31 by a vote of 402-0, declaring 28 January National Data Privacy Day. On 28 January 2009, the &lt;a href="https://en.wikipedia.org/wiki/United_States_Senate"&gt;Senate&lt;/a&gt; passed Senate Resolution 25 also recognizing 28 January 2009 as National Data Privacy Day. The United States Senate also recognized Data Privacy Day in 2010 and 2011.&lt;/p&gt;

&lt;h2&gt;
  
  
  Tips for Fortifying Your Privacy 🫵
&lt;/h2&gt;

&lt;p&gt;Personal data is processed continuously—whether at work, in interactions with public authorities, in healthcare, during purchases of goods or services, while traveling, or while browsing the internet. Despite this, individuals are often unaware of the risks associated with protecting their personal data and their corresponding rights. &lt;br&gt;
On this day, let's commemorate by reflecting on some privacy reminders:&lt;/p&gt;

&lt;p&gt;✔&lt;strong&gt;Do not get phished!&lt;/strong&gt; Phishing emails are one of the most common, and effective methods cyber attackers will use to gain access to secure information. To defend against these manipulative emails, you must: &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Stay cautious about emails from unfamiliar senders.&lt;/li&gt;
&lt;li&gt;Refrain from clicking on links in unexpected emails, as they might lead to fake websites or download harmful software to your device.&lt;/li&gt;
&lt;li&gt;Never reply to emails requesting confidential or personal information. Legitimate organizations won't ask for such details via email.&lt;/li&gt;
&lt;li&gt;If something sounds too good to be true, it probably is, so ignore any emails proclaiming that you have won a prize or a special discount.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;✔&lt;strong&gt;Guarding Against Deepfakes&lt;/strong&gt; Deepfake technology can create highly realistic videos that manipulate or replace the likeness and voice of individuals. In a malicious context, someone could create a deepfake video impersonating a trusted person, such as a friend, family member, or colleague, and use it to request sensitive information. Although identifying a fake video may be challenging, you can always:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Double-check the identity of the person making the request.&lt;/li&gt;
&lt;li&gt;Approach content with a healthy dose of skepticism, especially if it's unexpected or seems unusual.&lt;/li&gt;
&lt;li&gt;Stay informed about the latest developments in deepfake technology and understand the potential risks.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;✔&lt;strong&gt;Watch out for vishing and smishing attempts&lt;/strong&gt; Emails are not the only medium cyber criminals use to try and receive personal information. Fraudsters will also use SMS and voice messages to trick users into giving up personal information. So you must never handing out personal data over the phone and never clicking on links included in unsolicited SMS messages. &lt;/p&gt;

&lt;p&gt;✔&lt;strong&gt;Avoid using public Wi-Fi&lt;/strong&gt; Browsing online using public Wi-Fi can be convenient. But it can put your information at risk, as hackers can snoop on data transmitted throughout the network. So:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;You should refrain from transmitting your address and credit card information on public Wi-Fi.&lt;/li&gt;
&lt;li&gt;Public Wi-Fi is unsafe when there is no password for access-and event then, Wi-Fi hotspots can be used by nearby hackers to steal your data. Use a Virtual Private Network (VPN) if you have to connect on public Wi-Fi to add a layer of protection to your data.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;✔&lt;strong&gt;Confirm website security&lt;/strong&gt; If you are about to log in to a web platform, ensure that the site is legitimate. The first thing you should do is to check the URL. Make sure it begins with "HTTPS", which shows that there is an encrypted communication between your browser.&lt;/p&gt;

&lt;p&gt;✔&lt;strong&gt;Strengthening Your Passwords&lt;/strong&gt; You access most applications, which may contain personal data, and various online platforms by providing a password and a username. Therefore:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Create strong passwords on smartphones, laptops, tablets, email accounts, and any other device or account where personal information is stored. Weak passwords, like "12345" are the easiest way for hackers to access your data.&lt;/li&gt;
&lt;li&gt;Use Multi-Factor Authentication (MFA) wherever you can. MFA is an authentication method that requires the user to provide 2 or more verification factors to gain access to a resource such as an application, online account, or a VPN. One of the most common MFA factors that users encounter are one-time passwords (OTP). OTP are those 4-8 digit codes that you often receive via email or SMS. Other examples are fingerprints, facial recognition, answers to personal security information, etc.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;As we conclude this post on Data Privacy Day, let's use what we've learned to make online safety a habit. Following these easy tips for data privacy helps us feel more confident online. Every little effort to protect your info makes the internet safer for everyone. Let's keep caring about data privacy and work together for a future where our online experiences are safe and enjoyable!&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“If you put a key under the mat for the cops, a burglar can find it, too. Criminals are using every technology tool at their disposal to hack into people’s accounts. If they know there’s a key hidden somewhere, they won’t stop until they find it.”&lt;br&gt;
 – &lt;strong&gt;Tim Cook, Apple’s CEO&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>cybersecurity</category>
      <category>security</category>
      <category>data</category>
      <category>privacy</category>
    </item>
    <item>
      <title>2024 Unveiled: Top Cyber Trends in a Crystal Ball</title>
      <dc:creator>Chrysa Natsopoulou</dc:creator>
      <pubDate>Thu, 04 Jan 2024 10:30:03 +0000</pubDate>
      <link>https://forem.com/cnatsopoulou/2024-unveiled-top-cyber-trends-in-a-crystal-ball-5328</link>
      <guid>https://forem.com/cnatsopoulou/2024-unveiled-top-cyber-trends-in-a-crystal-ball-5328</guid>
      <description>&lt;p&gt;&lt;em&gt;According to &lt;a href="https://www.forbes.com/?sh=79404b432254"&gt;Forbes&lt;/a&gt;, by the end of the coming year, the cost of cyber attacks on the global economy is predicted to top $10.5 trillion.&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;As we step into the new year, fresh trends emerge on the cybersecurity horizon! &lt;/p&gt;

&lt;p&gt;Today, we'll delve into the anticipated trends of 2024. Given that many of these trends are projections rooted in the developments of 2023 or earlier, it's essential to take a moment to look back and examine the challenges encountered by cyber experts in the past year. This retrospective glance will provide us with valuable insights to navigate the evolving landscape of cybersecurity in the upcoming year. &lt;/p&gt;

&lt;h2&gt;
  
  
  2023: A Year in Review
&lt;/h2&gt;

&lt;p&gt;In 2023, several major companies experienced &lt;strong&gt;data breaches&lt;/strong&gt;. &lt;a href="https://www.okta.com/"&gt;Okta&lt;/a&gt;, for instance, fell victim to a breach linked to a compromised personal Gmail account. The hacker used it to sneak into the support case management system, and swiped customer session tokens that could be used to break into the networks of Okta customers. Another affected entity was &lt;a href="https://www.23andme.com/en-int/"&gt;23andMe&lt;/a&gt;, a consumer genetics and research company headquartered in California US, which encountered a credential stuffing attack, exposing the information of over 5 million users. &lt;a href="https://www.ups.com/us/en/Home.page"&gt;UPS&lt;/a&gt; faced a security incident involving attackers using obtained information to conduct SMS phishing attempts, falsely claiming to provide delivery details. Lastly, the &lt;a href="https://www.mgm.com/"&gt;MGM&lt;/a&gt; Ransomware attack targeted the company's employee password reset workflow.&lt;/p&gt;

&lt;p&gt;Certainly, ransomware attacks were among the negative trends of the previous year. In 2023, we observed some of the most notable instances of &lt;strong&gt;ransomware attacks&lt;/strong&gt;. This surge of digital attacks centers around taking advantage of a weakness in a managed file transfer software called &lt;a href="https://www.progress.com/moveit"&gt;MOVEit&lt;/a&gt;. The vulnerability, targeted by the Clop ransomware group linked to Russia, aimed to data theft, particularly personally identifiable information (PII) from customer databases. Moreover, one of the largest US dental health insurers, &lt;a href="https://www.mcna.net/en/home"&gt;Managed Care of North America&lt;/a&gt; (MCNA) Dental, was targeted by a ransomware attack that compromised the personal data of about 9 million individuals. &lt;/p&gt;

&lt;p&gt;Nevertheless, 2023 also ushered in positive trends that enhanced global security. &lt;strong&gt;Multi-factor Authentication&lt;/strong&gt; (MFA) emerged as a key player in this landscape. It mandates individuals to authenticate not only with something they know, like a password, but also with something they are or something they have. This extra layer of verification significantly bolsters security by adding multiple checkpoints, making it more challenging for unauthorized access. MFA's widespread adoption marks a crucial step forward in fortifying digital defenses against evolving threats. Furthermore, let's delve into the realm of &lt;strong&gt;quantum computers&lt;/strong&gt;. This trend carries both positive and negative implications. On the positive side, their remarkable speed enables the swift resolution of problems, such as optimization problems or machine learning optimization, that would traditionally take years. However, on the flip side, this very capability raises concerns about the potential to crack current encryption. If that happens, our existing ways of keeping data safe would be outdated, and we would need new methods to guard against these super-powerful computers. &lt;strong&gt;Artificial Intelligence&lt;/strong&gt; (AI), too, emerges as a trend with dual implications, encompassing both positive and negative aspects. On one hand, AI in the hands of ethical practitioners enables robust analysis and investigation. On the other hand, malicious actors utilizing AI can devise sophisticated attacks. This dual nature underscores the need for responsible development and deployment of AI technologies, as they wield the power to both enhance and potentially undermine various aspects of our digital landscape.&lt;/p&gt;

&lt;h2&gt;
  
  
  10 Top Cyber Trends in 2024
&lt;/h2&gt;

&lt;p&gt;And now let's turn our attention to what's happening in 2024. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;1. Moving from passwords to passkeys.&lt;/strong&gt; Remembering passwords can be a hassle and poses a risk if they fall into the wrong hands. That's why there's a shift towards using passkeys, a new technology, based on FIDO2 authentication, for secure logins. With passkeys, you don't need to remember a traditional password; instead, you can use a simpler, more user-friendly, and secure method. Passkeys enable users to access apps and websites employing features like fingerprint recognition, facial scans, or screen lock PINs. Unlike passwords, passkeys offer resistance against online threats such as phishing, enhancing security compared to methods like SMS one-time codes.&lt;/p&gt;

&lt;p&gt;According to Blair Cohen, founder and president of AuthenticID, &lt;em&gt;"I applaud it and think it's great for everyday consumer use, but don't think FIDO2 will be the choice of enterprises, large-scale banks, etc. There are just too many vulnerabilities,"&lt;/em&gt; he said,  specifically highlighting its vulnerability to first-party fraud. &lt;br&gt;
Jack Poller, analyst at TechTarget's Enterprise Strategy Group (ESG) disagreed saying "&lt;em&gt;FIDO2 is going to win in the consumer marketplace since many enterprise organizations, such as Google, Amazon and Apple, currently support it because it's phishing-resistant.&lt;/em&gt;"&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;2. Increase of IoT attacks.&lt;/strong&gt; Today an increasing number of individuals opt for smart devices that seamlessly communicate with each other and connect to the internet. This happens because these devices are designed for ease of use and convenience rather than secure operations, and home consumer IoT devices may be at risk due to weak security protocols and passwords. Nevertheless, this growing reliance on interconnected devices also presents additional opportunities for cyber attackers to infiltrate and exploit potential vulnerabilities. Additionally, with the ongoing work-from-home revolution, the risks associated with employees connecting or sharing data over inadequately secured devices persist as a significant threat in 2024.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;In the realm of IoT, every device transforms into a computer, and as we understand, every computer is susceptible to hacking. Thus, each smart device holds the potential vulnerability to hacking.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;3. Increased focus on AI.&lt;/strong&gt; The 2024 is AI heavy.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;AI phishing:&lt;/em&gt; People have become educated and can often identify phishing emails due to the presence of poor grammar and spelling mistakes. With AI phishing, bad actors can use Large Language Models (LLMs) to remove these idiosyncrasies and sound more like a native speaker, luring victims into a false sense of security. So, organizations will need a more advanced tool to effectively prevent fraud, that examines additional factors about the fraudster, like their IP address, location, and user ID, rather than just focusing on the content they generate.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Increase of deepfake social engineering attempts:&lt;/em&gt; This kind of attack, where someone's voice and face are faked to make others believe and trust a misleading video, is on the rise. These deepfakes can be used for social engineering attacks, impersonation, and spreading false information. It's crucial for people to establish security measures that don't rely solely on the information in the deepfake itself. In 2024, deepfake technology, creating realistic yet fake audio and video, is becoming a more significant concern. As the threat of deepfakes grows, organizations need to invest in tools and strategies to detect deepfakes and protect their reputation and data integrity. Raising awareness and providing education are vital in addressing this emerging threat.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;AI Hallucination threat:&lt;/em&gt; This is a phenomenon wherein LLM-often a generative AI chatbot-provide people with information that is not always right and contributes to the spread of misinformation. AI models can also be vulnerable to adversarial attack, wherein bad actors manipulate the output of an AI model by subtly tweaking the input data. The best way to mitigate the impact of AI hallucinations is to train the AI models on diverse, balanced and well-structured data, to test the system continually, and make sure a human being is validating and reviewing AI outputs.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;If cyber attack and defense in 2024 is a game of chess, then AI is the queen – with the ability to create powerful strategic advantages for whoever plays it best.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;&lt;strong&gt;4. Ransomware attacks.&lt;/strong&gt; In 2024, ransomware attacks are anticipated to evolve into more sophisticated threats, impacting both individuals and organizations. A strong defense against such attacks lies in having a resilient backup and recovery plan. Consistently backing up data, educating staff about phishing risks, and deploying effective security measures are crucial components of this strategy. The ongoing battle against ransomware remains a paramount focus within the realm of cybersecurity.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;5. Regulatory Compliance and Privacy.&lt;/strong&gt; As organizations increasingly leverage data, there is a growing emphasis on ensuring data privacy and protection. Consequently, regulatory frameworks are constantly evolving. In 2024, organizations will prioritize compliance with rigorous data protection regulations, including acts such as the &lt;a href="https://dev.to/cnatsopoulou/decoding-data-compliance-a-dive-into-the-data-act-data-governance-act-3a75"&gt;Data Act and Data Governance Act&lt;/a&gt;. The emphasis will be on transparent data practices, the implementation of robust security measures, and the demonstration of accountability in the handling of sensitive information.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;6. Less than Zero trust.&lt;/strong&gt; In 2024, Zero Trust cybersecurity will continue grow as a priority for many organizations amid intensifying cyberthreats and many organizations will continue implementing a cybersecurity strategy based on zero trust principles as they did the previous year. In 2024, expect more widespread adoption of Zero Trust principles, which means that trust is never assumed and there will be more ways to verify users really are who they claim to be, and adding measures to ensure malicious actors won’t get far even if they thwart initial defenses.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;7. Explosion of BYOD and mobile devices.&lt;/strong&gt; In 2024, we can expect a sustained surge in the prevalence of BYOD (Bring Your Own Device) and increased reliance on mobile devices. To keep important company information safe on these devices, organizations will have to use strong Mobile Device Management (MDM) solutions and make sure strict security rules are followed. Balancing the need for employees to be productive with making sure all data is protected will be a big challenge for companies in this changing environment.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;8. Cybersecurity skills gap and education.&lt;/strong&gt; The demand for skilled cybersecurity professionals is higher than ever. There’s a growing gap between the demand and the available talents. According to Forbes, research indicates that a majority (54%) of cyber security professionals believe that the impact of the skills shortage on their organization has worsened over the past two years. In 2024, this IT skills gap will persist, making it challenging for organizations to find qualified experts to manage their cybersecurity needs. Organizations will need to invest in training and development programs to upskill their existing staff and attract new talents. The shortage of cybersecurity experts is a pressing issue that can’t be ignored.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;9. Quantum cryptography.&lt;/strong&gt; As previously noted, the emergence of quantum computing presents a challenge to traditional cryptography and this year we are closer to this threat. That's why in 2024, there will be a substantial uptick in the use of cryptographic algorithms designed to resist quantum attacks. Businesses will prioritize the enhancement of their cryptographic techniques to protect sensitive data from potential threats posed by quantum computing. This dynamic landscape offers a considerable growth opportunity within the realm of security.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;10. Platform engineering&lt;/strong&gt;. This trend holds significance in 2024 as it marks a pivotal evolution in the development of software and applications. In the early stages of organizational growth, a single development team typically handles all responsibilities. However, as the organization expands, it becomes common to have separate security and development teams. In this scenario, cybersecurity plays a crucial role in orchestrating effective collaboration between these two teams to enhance productivity and ensure seamless operations.&lt;/p&gt;

&lt;p&gt;In summary, there has been a concerning increase in data breaches up to the present moment. The looming threat of ransomware attacks remains persistent. MFA is now being provided as an option by numerous websites. Additionally, there has been a staggering 400% rise in IoT threats. As we navigate these challenges, it is crucial for organizations to prioritize cybersecurity measures, adapt to evolving threats, and stay proactive in safeguarding sensitive data and systems this year as well.&lt;/p&gt;

&lt;p&gt;And, as always, let's wrap up with a few quotes...&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;“It takes 20 years to build a reputation and few minutes of cyber-incident to ruin it.” &lt;br&gt;
&lt;strong&gt;Stephane Nappo, Vice President. Global CISO, Groupe SEB&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;“We discovered in our research that insider threats are not viewed as seriously as external threats, like a cyberattack. But when companies had an insider threat, in general, they were much more costly than external incidents. This was largely because the insider that is smart has the skills to hide the crime, for months, for years, sometimes forever.”&lt;br&gt;
&lt;strong&gt;Dr. Larry Ponemon, Chairman, Ponemon Institute, at SecureWorld Boston&lt;/strong&gt;&lt;/p&gt;
&lt;/blockquote&gt;

</description>
    </item>
    <item>
      <title>Decoding Data Compliance: A Dive into the Data Act &amp; Data Governance Act</title>
      <dc:creator>Chrysa Natsopoulou</dc:creator>
      <pubDate>Tue, 02 Jan 2024 13:27:50 +0000</pubDate>
      <link>https://forem.com/cnatsopoulou/decoding-data-compliance-a-dive-into-the-data-act-data-governance-act-3a75</link>
      <guid>https://forem.com/cnatsopoulou/decoding-data-compliance-a-dive-into-the-data-act-data-governance-act-3a75</guid>
      <description>&lt;p&gt;Welcome to our blog journey into the world of data rules! &lt;/p&gt;

&lt;p&gt;Today, we're talking about two important game-changers—the Data Act and the Data Governance Act (DGA). Think of them as guideposts in the digital world, showing us how to handle data smarter. Let's dive in together to understand what these rules mean, how they shape our data future, and why it matters in our ever-evolving digital world.&lt;/p&gt;

&lt;p&gt;Data Act and DGA are two regulations that are part of the European Data Strategy. The European Data Strategy aims to build a data market, where data can flow within Europe. This strategy comprises four key components, each addressing a distinct facet of the overall strategy:&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Data Governance Act&lt;/em&gt;&lt;br&gt;
Ensure TRUST in data sharing.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Data Act&lt;/em&gt;&lt;br&gt;
Ensure FAIRNESS in the allocation of data value among the actors of the data economy.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Implementing Act under Open Data Directive&lt;/em&gt;&lt;br&gt;
Unleash the socio-economic potential of data as material for INNOVATION in particular Small and Medium-sized Enterprises (SMEs).&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Digital Market Act&lt;/em&gt;&lt;br&gt;
Regulate MARKET POWER based on data.&lt;/p&gt;

&lt;h2&gt;
  
  
  Data Governance Act
&lt;/h2&gt;

&lt;p&gt;We ought to contemplate the significance of the DGA regulation and explore the underlying reasons that prompted its creation. Well, the emergence of digital technologies and the increasing significance of data was the reason to create this regulation. As people share and use data, new problems and issues about its safety and responsible handling, have come up. &lt;/p&gt;

&lt;p&gt;So, let's image DGA as a rulebook of how data, whether it is about personal or non-personal data, should be handled. Of course, it works alongside other rules like GDPR. The goal is to make data move freely in the EU, and everything related to data to be trustworthy and safe. &lt;/p&gt;

&lt;p&gt;&lt;em&gt;So what does the DGA actually do?&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;1. Reusing certain types of data held by public bodies in the EU&lt;/em&gt;&lt;br&gt;
 The law permits individuals to utilize government-provided valuable information for purposes such as research or projects.&lt;br&gt;
&lt;em&gt;2. Setting up a system to notify and oversee services that help with sharing data&lt;/em&gt;&lt;br&gt;
 The DGA establishes a mechanism for overseeing companies or services involved in data sharing, ensuring their adherence to regulatory guidelines.&lt;br&gt;
&lt;em&gt;3. Creating a way for groups collecting and using data for good causes to register voluntarily&lt;/em&gt;&lt;br&gt;
 In accordance with DGA, groups collecting data for legitimate reasons can opt to register and demonstrate their adherence to proper practices. Consider a neighborhood watch group gathering information on local incidents to bolster community safety. This group can affirm its commitment to using data for constructive purposes by adhering to the established regulations.&lt;br&gt;
&lt;em&gt;4. Establishing a board to promote innovative uses of data in Europe&lt;/em&gt;&lt;br&gt;
 The DGA forms a group that encourages coming up with new and cool ways to use data for the benefit of Europe. For example, researchers might analyze healthcare data to improve medical treatments.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;But how DGA affects the area of cybersecurity?&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;Organizations that adhere to this regulation experience enhanced &lt;strong&gt;data management&lt;/strong&gt; by establishing robust procedures for handling information. Additionally, compliance with DGA enables them to invest in &lt;strong&gt;cybersecurity tools and practices&lt;/strong&gt;, including encryption techniques and Multi-Factor Authentication (MFA). DGA also promotes the importance of &lt;strong&gt;educating staff&lt;/strong&gt; on responsible data practices and cybersecurity. Last but not least, companies are required to develop an &lt;strong&gt;incident response plan&lt;/strong&gt; to effectively address cybersecurity incidents.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;What do companies need to comply with the law?&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;DGA holds significant importance as it compels businesses to transform their approach to data management, evolving from mere protection to a more comprehensive framework. Consequently, here are some of the requirements expected from organizations and EU countries under the DGA:&lt;br&gt;
Primarily, organizations are required to implement robust measures for the &lt;strong&gt;secure handling of data&lt;/strong&gt;. This entails enforcing stringent &lt;strong&gt;access controls&lt;/strong&gt; to ensure that only authorized individuals can access and utilize the data. Employing &lt;strong&gt;encryption&lt;/strong&gt; techniques is mandatory to safeguard data during both transmission and storage. In a broader sense, organizations must establish a comprehensive &lt;strong&gt;data governance framework&lt;/strong&gt;, delineating rules and procedures for effective data management to foster transparency and accountability. Furthermore, organizations are obligated to &lt;strong&gt;collaborate with competent bodies&lt;/strong&gt; to ensure the seamless implementation of DGA's cybersecurity requirements across public sectors. For instance, if a government agency is tasked with enforcing cybersecurity measures in accordance with the DGA, collaboration with a cybersecurity expert organization may be essential to ensure correct interpretation and application of policies.&lt;/p&gt;

&lt;p&gt;To ensure the effective implementation of the plan for reusing data, each EU country must:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Select qualified individuals to spearhead the execution of this plan within their public offices.&lt;/li&gt;
&lt;li&gt;Establish a centralized platform where individuals can pose questions or submit requests for data reuse.&lt;/li&gt;
&lt;li&gt;Develop a streamlined process for handling data reuse requests within a specified timeframe following the receipt of each request.&lt;/li&gt;
&lt;/ol&gt;

&lt;blockquote&gt;
&lt;p&gt;The DGA entered into force on 23 June 2022 and is applicable since 24 September 2023.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  DATA ACT
&lt;/h2&gt;

&lt;p&gt;The DGA needs a companion...Today, the Internet of Things (IoT) revolution fuels exponential growth with projected data volume set to skyrocket in the coming years. Considering that 80% of data is unused due to trust barriers, the Data Act regulation was the next logical step that brings new rules for data sharing.&lt;br&gt;
The Data Act aims to boost the EU's data economy by unlocking industrial data, optimising its accessibility and use, and fostering a competitive and reliable European cloud market. It seeks to ensure that the benefits of the digital revolution are shared by everyone.&lt;br&gt;
This regulation specifically addresses data generated through connected products. The Data Act empowers users of connected devices, spanning from smart household appliances to intelligent industrial machines, to access data generated during their usage. This data is frequently held exclusively by manufacturers.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Which are the objectives of Data Act?&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;em&gt;1. Empower Consumers and Companies using Connected Products&lt;/em&gt;&lt;br&gt;
 The primary objective is to empower individuals and businesses utilizing smart devices. For instance, with a smart thermostat, the Data Act aims to streamline the control and comprehension of how your data is utilized, offering greater transparency and control.&lt;br&gt;
&lt;em&gt;2. Increase Availability of Data for Commercial Use and Innovation Between Businesses&lt;/em&gt;&lt;br&gt;
 Moreover, with increased data accessibility for businesses, they can leverage it to generate innovative ideas. For example, if a weather station collects data, the Data Act could enable a company to utilize that information in developing a new app tailored for farmers.&lt;br&gt;
&lt;em&gt;3. Introduce New Mechanisms for Re-use by Public Sector Bodies of Data in Exceptional Situations&lt;/em&gt;&lt;br&gt;
 The subsequent objective is to permit government agencies to repurpose data during emergencies, utilizing information collected for one purpose to contribute to disaster response efforts.&lt;br&gt;
&lt;em&gt;4. Increase the Fluidity of the Cloud/Edge Market and Raise Trust in the Integrity of Cloud and Edge Services&lt;/em&gt;&lt;br&gt;
 The Data Act also influences cloud services, facilitating their optimal functionality and instilling trust in their security measures. For instance, if you utilize a cloud service to store photos, the Data Act may ensure the safety and security of your photos.&lt;br&gt;
&lt;em&gt;5. Establish a Framework for Efficient Data Interoperability&lt;/em&gt;&lt;br&gt;
 The final objective is to establish a system that enhances the seamless integration of various types of data. This implies that if you possess health data from a fitness app and wish to utilize it in a different app, the Data Act could formulate rules to facilitate a smooth and efficient process.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;How can someone be compliant with Data Act regulation?&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;As the Data Act centers around smart devices, one essential requirement is that products with internet connections must be manufactured and designed to allow individuals easy access to their data without the need for a formal data access request. However, in situations where direct user access to the data is not feasible, the data holder, typically the provider of a connected service, is obligated to promptly and readily provide the data to the user upon request. The next requirement pertains to data owners and users who have the authority to cease access, usage, or sharing if it contravenes EU or country security laws. The final requirement pertains to the GDPR, stating that the Data Act does not impact rights and obligations under the GDPR, nor does it establish any new legal basis for processing personal data.&lt;/p&gt;

&lt;p&gt;The Data Act also has implications for cybersecurity. It significantly impacts how companies manage data and address cybersecurity concerns. While advocating for increased information sharing, it also poses challenges, such as preventing unauthorized access, mitigating employee malware risks, and implementing robust encryption methods to ensure data security: &lt;br&gt;
&lt;strong&gt;Increased Data Sharing&lt;/strong&gt;&lt;br&gt;
The Data Act pushes organizations to share data securely as they are now encouraged to share more data for various purposes.&lt;br&gt;
&lt;strong&gt;Data Intermediation Services&lt;/strong&gt; &lt;br&gt;
The Act establishes regulations for managing data on behalf of others, such as a cloud storage company handling data for its clients.&lt;br&gt;
&lt;strong&gt;Competition and Security Balance&lt;/strong&gt; &lt;br&gt;
The Act aims to ensure fair competition among companies in the data market. While encouraging healthy competition, it emphasizes the importance of not compromising the safety and security of the data.&lt;br&gt;
&lt;strong&gt;Standardization and Security Measures&lt;/strong&gt; &lt;br&gt;
The Act may establish standards for data sharing, ensuring that organizations adhere to robust cybersecurity measures.&lt;br&gt;
&lt;strong&gt;Data Innovation and Security&lt;/strong&gt; &lt;br&gt;
The Act incorporates regulations for establishing a European Data Innovation Board. While promoting new ideas is commendable, cautious consideration is essential for cybersecurity. The objective is to mitigate security risks that may emerge from experimenting with innovative approaches to data usage.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;In 2023, the Council and the European Parliament reached a provisional agreement for Data Act and it will enter into force in Q3 2025.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;And let's conclude with two quotes...&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;This is a significant milestone in the journey towards a single market for data. The Data act will optimise data use by improving data accessibility for individuals and businesses. This is very good news for our digital transformation.&lt;br&gt;
&lt;strong&gt;&lt;em&gt;Margrethe Vestager, Executive Vice-President for a Europe Fit for the Digital Age - 28/06/2023&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Following the adoption of the Digital Services, Digital Markets and Data Governance Acts, today’s agreement forms another milestone in our efforts to re-shape the digital space. The Data Act will ensure that industrial data is shared, stored and processed in full respect of European rules. It will create a thriving data economy that is innovative and open, but on our European conditions.&lt;br&gt;
&lt;em&gt;&lt;strong&gt;Thierry Breton, Commissioner for Internal Market - 28/06/2023&lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>learning</category>
      <category>cybersecurity</category>
      <category>data</category>
      <category>regulation</category>
    </item>
  </channel>
</rss>
