High-Level Overview of How to Approach Implementation Governance and Accountability Data Mapping and Inventory Risk Assessment and Data Protection Impact Assessments (DPIA) Data Subject Rights Management Data Security Data Transfers …
Oracle Autonomous Database
Oracle says, Autonomous Database is a mission-critical, converged database that runs transactional and analytic workloads. It automatically scales, tunes, patches, and secures all the workloads using machine learning to provide …
Data Warehouse, Data Lake & Data Vault
Data Lakes & Data Warehouses Data Lakes and Data Warehouses both act as repositories, but they are designed for very different purposes. Data Warehouses work best for specific projects with …
Data Security – Essential Concepts
IS – Information Security has a specific Vocabulary. Knowledge of Key Terms enables Clearer Articulation of Governance Requirements. Threat is a Potential Offensive Action that could be taken against an …
ISMS – ISO/IEC-27001:2013 – Annex A
ISO = International Organization for Standardization IEC = International Electrotechnical Commission ISMS = Information Security Management System ISO/IEC-27001:2013 is the International Security Standard and Best Practice Guidelines, which details the …