All Breaches and Vulnerabilities articles
-
Webinar
Data Retention: The Blind Spot in your Privacy Programme (Central & Eastern Europe)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Webinar
The Human Element: Reducing Email Data Breaches By Combatting Human-Activated Risk
Did you know that 91% of cyberattacks are distributed by email and 82% of data breaches involve a human element?
-
Report
Charting the UK Data Protection Profession: June 2022 Report
Data Protection World Forum and The DPO Centre are delighted to bring you the eighth Index survey report from the ground-breaking UK Data Protection Index.
-
Video
Best Practices for Detecting, Preventing and Recovering From Ransomware
Ransomware continues to cause huge losses and harms across the globe. But taking a proactive approach to security and business continuity can reduce the likelihood of falling victim to an attack—and reduce the damage that occurs if you are targeted.
-
Video
The Dangers of AI-Driven Mass Surveillance
Artificial intelligence is driving huge improvements in fields as diverse as medicine and climate monitoring. But from biometric identification to “social credit” scoring systems, AI is also providing new ways for governments and large corporations to track and surveil people—with significant implications for their privacy and freedom.
-
Video
Can Privacy Enhancing Technologies (PETs) Solve the Data Transfer Puzzle?
The legal issues around data transfers continue to cause confusion and consume resources. Many believe the solution lies in Privacy Enhancing Technologies (PETs). The US and UK governments are even collaborating on an “innovation prize challenge” to encourage the development of PETs for data transfers.
-
Video
Keeping Pace with Emerging Threats
Cyber criminals are leveraging innovative techniques and taking advantage of new security vulnerabilities. Organizations must evolve and adapt their defenses to protect against the next wave of cybersecurity threats.
-
Video
Data Retention and Minimisation: Best Practice
Getting data retention and minimisation right is crucial to ensuring effective data protection compliance. Only collecting the data you need, and only storing it for as long as required, significantly reduces the likelihood of a data breach or other violation.
-
Video
How to Avoid Software Supply Chain Attacks
From Solarwinds to Kaseya to Log4j—the security risk from software supply chain attacks shows no sign of abating.
-
Webinar
After the attack: Mitigating Organisational Impact of a Data Breach? (LATAM region)
After the attack: Mitigating Organisational Impact of a Data Breach?
-
Feature
Risk and Resilience in a Dynamic Environment
Effective risk and resiliency within an organization is arguably the heart and soul of success.
-
Feature
Key Tactics for Effective Cybersecurity
As the pandemic pushed millions of workers home, corporations rushed to build infrastructure to support their new remote workforce.
-
Feature
Meet the expert: Jonathan Craven to speak at PrivSec World Forum
Privacy leader, Jonathan Craven will be among the experts speaking at PrivSec World Forum, this month.
-
News
The PICCASO Privacy Awards
To mark four years since the GDPR came into effect, Privacy Culture Limited & GRC World Forums in partnership with PICCASO are delighted to launch the inaugural ”PICCASO Privacy Awards” to recognise and celebrate the many extraordinary achievements of the wide community of privacy professionals.
-
Feature
Meet the expert: Bill Mew to speak at PrivSec World Forum
We are delighted to announce that digital ethics campaigner and global cybersecurity expert, Bill Mew will speak at PrivSec World Forum next month.
-
Feature
Don’t miss the editor’s top five sessions at PrivSec World Forum
With two weeks to go to PrivSec World Forum, event editor and research director, Robert Bateman shares his top five sessions to look out for.
-
Feature
GDPR Four Years On: How Has the Law Changed the World, and How Can It Be Improved?
The General Data Protection Regulation (GDPR) is perhaps the EU’s best-known and most-misunderstood law.
-
Video
Creating a Robust Data Breach Management Policy
This session will consider the key elements of a data breach management policy, from detection and notification to mitigation and review stages.
-
Q&A
Meet the expert: Merilyne Davies among guests at PrivSec: World Forum
Visitors to next month’s PrivSec World Forum can hear the views of data protection senior, Merilyne Davies, we are delighted to announce.
-
Feature
Meet the expert: Jose Belo to speak at PrivSec Focus: Enterprise Risk
Audiences can hear the views of data privacy specialist, Jose Belo, when they tune into PrivSec Focus: Enterprise Risk next week.