Catch up & Watch PrivSec Global On Demand – Page 21
-
Video
The Deployment of AI, ML and Emerging Technologies in Cyber Defence and Attack
The deployment of new and cutting-edge technologies like Machine Learning and Artificial Intelligence can help security specialists to analyse and correlate data to identify patterns, scan various risks, gain predictive insights and forecast potential breaches.
-
Video
Data Protection and Security in the Cloud
As the cloud environment continues to develop and new mechanisms are introduced which affect organisations’ strategies, opportunities and risks grow in complexity.
-
Video
Harmonisation of Data Protection Regulations Across the Region
Harmonisation of regulation across the major APAC economies continues to be a major theme of 2020 and 2021
-
Video
To Trust, or Not to Trust the Cloud That is Your Compliance and Risk Question
Many organizations struggle with digital transformation and cloud computing, particularly when implementing a framework to meet their compliance requirements.
-
Video
Edgar Perez in Conversation
One of the world’s foremost experts on how organisations can harness bleeding edge technologies to give themselves competitive edge, Edgar Perez will share his insights into how the world’s leading companies are changing their business models to leverage technical change.
-
Video
Staying Competitive while Maintaining Global Regulatory Compliance
From managing risk to creating edge: how data protection practitioners are helped to build competitive advantage for their organisations.
-
Video
Disposing of Data Securely & Completely in a Post-Covid World
Drawing on industry research, best practices and case studies, we’ll explore why enterprises must address end-of-life data more efficiently and precisely than ever before.
-
Video
Building a Risk Management Framework for the Future
Managing risk is at the heart of any data protection programme and building a strategy which can navigate changes in market and business strategy is crucial.
-
Video
Identifying Risky Vendors: 7 Warning Signs You Shouldn’t Ignore
For individuals managing third-party risk, there is one primary question that needs answering: Are your vendors safe to do business with?
-
Video
Using Security as a Tool to Build Competitive Edge
Security functions in some leading organisations are beginning to move beyond just their role as defence mechanism and are defining the role they can play in contributing to the overall strategic vision.
-
Video
Financial Data and the Ethical Issues of Technical Innovation
Financials services is one of the most innovative sectors in they way organisations source and use information and this creates multiple challenges for data protection professionals - this panel discusses the practical issues in creating an ethical strategy.
-
Video
Embedding Security and Risk Management into Your Organisation
Cyber security plays a critical role in helping digital businesses to flourish.
-
Video
Best practice advice on data sharing requests policy
The regulatory regimes across the Middle East and North Africa are going through a stage of rapid development and alignment, creating challenges for companies doing business across the region.
-
Video
Why It’s Time to Rethink Your Approach to Data Classification
How can enterprises know their data in a fragmented data landscape of diverse data formats, schemas, content, and metadata types? Why haven’t we solved the classification conundrum - and how can security and privacy teams lead the charge for next-generation classification?
-
Video
The Zero Trust Model - Securing Your Sensitive Data
Speaker Panel The Zero Trust Model - Securing Your Sensitive Data Video: The Zero Trust Model - Securing You…
-
Video
Data Discovery: What Skeletons are Hiding in Your Unstructured Data?
With the ever-increasing use of data and number of digital threats to organisations, data breaches are unfortunately commonplace.
-
Video
What Does a Successful Data Access Governance Programme Look Like?
Strong walls only get you so far – the nature of a best practice approach to data access governance is to increase the focus on how data is controlled internally.
-
Video
Data Discovery: What Skeletons are Hiding in Your Unstructured Data
Unstructured data is a compliance risk. Examples of this type of data can include the content of email messages and spreadsheets through to business plans and intellectual property.
-
Video
Business resilience and continuity in a time of uncertainty
Business continuity planning allows organisations to respond, resume and restore operations in the event of disruptions.
-
Video
Jeff Lanza on Cybercrime: Strategies to Prevent, Protect and Prevail
From computer intrusions to ransomware, a 20-year veteran FBI special agent and cyber security expert traces the evolution of the cybercrime “pandemic” and provides countermeasures to combat the global threat.