News & Events
For educational information and company updates, explore the full range of our news postings. Want to get the news as it's published? Follow us on social media.
ISO 27701 – The What, the How, the When and the Who Answered
Post ISO 27701:2019 webinar analysis from Santosh Putchala, Director of Privacy & Data Protection, Kuma LLC and Kishor Vaswani, Founder & CEO, ControlCase
Data Privacy Day is Coming! How are you Celebrating?
Kuma is getting involved in Data Privacy Day 2020 and encouraging others to celebrate too
ISO 27701 In the Age of Privacy – Webinar
Kuma and ControlCase will discuss ISO 27701 and how companies can get ready for the privacy standard
Cyberbullying Awareness Month Update – Kuma Foundation
Kuma Foundation's support for Cyberbullying Awareness Month
To Infinity and Beyond
Join Kuma’s @JennBehrens for the webinar “To Infinity and Beyond – Facial Recognition Technology and Impact on Privacy” on October 30th (1 PM ET/10 AM PT) to hear from industry, privacy and government experts about the reality of the technology behind FRT, the privacy risks to individuals, and how government agencies are working to rebalance privacy risk and rewards.
Kuma Foundation Supporting Cyberbullying Awareness Month
Join the Kuma Foundation in the conversation about cyberbullying during October 2019, National Cyberbullying Awareness Month.
What ISO/IEC 27701:2019 Means for Your PII Data
ISO/IEC 27001 offers you a way to demonstrate your organizational commitment to privacy and data protection in a way previously hard to achieve. Now, similarly to the wide array of security standards in the market, certification of 27001 can be used as a business enabler to facilitate agreements with business partners, to assist in relationships with other stakeholders, and provide independent verification of your organization’s protection of privacy. Organizations planning to seek an ISO/IEC 27701 certification will also need an ISO/IEC 27001 certification. This demonstrates a commitment to both information security and privacy management.
Beyond the Tip of the Iceberg:
Understanding the risk that other companies introduce into your network should not be a meaningless check-the-box exercise. Threat assessment projects are not high-profile, glamorous or fun, and if you’re looking to find a trigger point for a battle with your sales team, a risk assessment for a potential client is a sure bet. But the reality is that risk assessments are where it’s at these days, because there is tremendous risk that must be mitigated, and that requires consideration and commitment in order to protect your enterprise.
End of content
No more pages to load