December 2009

[Applying the risk management framework to federal information systems | Outpacing change | Cyber security mega trends | The rational rejection of security advice by users | The Data protection guide | Security risks, online banking and eID cards | Anatomy of a data breach | Data protection accountability - the essential elements]

Creative Commons License

All original content on this website © 2009 Rina Steenkamp. This work is licensed under a Creative Commons License. On this page Transitional HTML 4.01 and CSS 1 are used. If you're seeing this text you either have CSS switched off in your browser, or you're using a browser that can't handle CSS. If you're using an older browser version, you might want to consider upgrading.