Beyond Compliance awam
[search 0]
lebih
Download the App!
show episodes
 
What does everyday life during war and armed conflict look like? How do ordinary people engage with armed actors? And how can the law contribute to protecting civilians? Join Katharine Fortin and Florian Weigand in their discussions with leading academics, researchers, and practitioners working and conducting research in this area, shedding light on armed groups, civilian protection, and international law.
  continue reading
 
Welcome to “Cyber Compliance and Beyond,” a Kratos podcast that will bring clarity to compliance, helping put you in control of cybersecurity compliance in your organization. Kratos is a leading cybersecurity compliance advisory and assessment organization, providing services to both government and commercial clients across varying sectors including defense, space, satellite, financial services, and health care. Through "Cyber Compliance and Beyond," our cyber team of experts will share thei ...
  continue reading
 
Loading …
show series
 
The news about cybercrime is overwhelming to those who fight to secure our organizations. Cybercrime organizations are sophisticated and constantly changing. But there’s a hidden truth in cybercrime attacks: cybercriminals exploit the same weaknesses they’ve been exploiting for years. This should give us some hope; we know where our organizations a…
  continue reading
 
What role did civilians play during the conflict and peace process in Northern Ireland? How does agency relate to victimhood and transitional justice? And how can people contribute to ‘everyday’ peace? In this episode, Katharine and Florian talk to Kieran McEvoy from Queen’s University Belfast and to Roger Mac Ginty from Durham University about Nor…
  continue reading
 
In this episode, Katharine and Florian speak to Sophie Haspeslagh from Kings College London and Gloria Gaggioli from the University of Geneva about their research on counter-terrorism law, its mechanisms, effects and how it links to civilian agency and international humanitarian law. During the conversation, Sophie and Gloria provide insights on ho…
  continue reading
 
CMMC’s security requirements are not new. What is new about CMMC is the level of rigor. With the recent publication of the CMMC rule, DoD is ever closer to requiring contractors to comply with CMMC security requirements and back them up with an assessment. The CMMC Rule, like any new regulation, is packed with details. Details that have been rumore…
  continue reading
 
What influences civilians' decision to stay or leave in times of armed conflict? In this episode, Katharine and Florian talk to Mara Revkin and Justin Schon about their research on civilian decision-making, access to information and flight in Syria and Iraq. They discuss the concept of civilian agency and talk about the challenges of conducting res…
  continue reading
 
How do civilian communities negotiate with armed groups? What do people try to achieve in these negotiations? And what enables them to negotiate with an armed actor? In this episode, Katharine and Florian talk to Riyad Anwar, Ashley Jackson and Abellia Anggi Wardani about their novel research on civilian agency during the armed conflicts in Afghani…
  continue reading
 
How do people protect themselves in violent environments outside of ‘traditional’ war zones? And to what extent does international humanitarian law (IHL), the law of armed conflict, apply in such contexts? In this episode, Katharine and Florian talk to Chiara Redaelli and Anjan Sundaram about Mexico. Together they dive into the activism and courage…
  continue reading
 
AI is bringing speed and velocity never seen before. Some studies show that the output is the equivalent to what 35-40 humans can produce. This speed and velocity is applied to countless use cases across just about every economic sector. Cybersecurity compliance is laden with repetitive, redundant, and time-consuming manual tasks. While humans brin…
  continue reading
 
More than half the world’s population are living in settings where they are regularly exposed to violence, whether from armed actors, gangs, community defence forces or criminal groups. What do civilian communities do to protect themselves and others in these settings? And what can we learn from them about civilian protection? To look at these ques…
  continue reading
 
In this episode of ‘Beyond Compliance: In Conversation’, Katharine and Florian talk to two experts from the International Committee of the Red Cross about armed groups, civilian agency and international law. Almost 200 million people live in areas controlled or influenced by armed groups, finds the International Committee of the Red Cross (ICRC). H…
  continue reading
 
Supply chain security is not new, though it certainly feels as though it is. Thanks to globalization, supply chains are ever growing in their depth, complexity, and interconnectedness. Unfortunately, like so many other systems, security of supply chains hasn’t been at the top of the list of things to consider when evaluating supply chains. Understa…
  continue reading
 
IT support is tricky for most businesses, especially for those not in the IT business. Thus, IT is a cost of doing business and a high cost at that. High costs drive down profits. Less profit makes it harder for businesses to invest in the products or services that they’re making and selling. Retaining IT staff is even more difficult. This is due t…
  continue reading
 
Vulnerabilities are everywhere and on every IT asset within an organization. This makes vulnerability management one of the most important – if not the most important – risk mitigation activities an organization undertakes. But, the complexities inherent in many organizations combined with the sheer number of vulnerabilities leaves many not knowing…
  continue reading
 
The number of compliance frameworks is seemingly endless. The lack of standards is problematic enough. Even more problematic, however, is how the compliance frameworks overlaps with one another. When it comes to International Trade and Export Compliance, the problem is overlap is accentuated by the fact that there is not a definitive ‘framework’ fo…
  continue reading
 
Some recent estimates have postulated that data is now the world’s most valuable asset. Unlike other assets, like oil, for example, data proliferates on a staggering scale. In other words, it doesn’t seem to be finite, subject the law of scarcity. This hammers home the importance of answering the question that each of you are wrestling with: how do…
  continue reading
 
One of the greatest challenges to security compliance are exception cases. What are exception cases? They are the cases in which a particular compliance objective cannot be achieved, as required. The reasons are myriad: cost, environmental constraints, vendor dependency, and technical limitations. Building an exception case is key to achieving comp…
  continue reading
 
Loading …

Panduan Rujukan Pantas

Podcast Teratas