Catch-Up
-
Webinar
The Option of Qualitative Versus Quantitative is Not a Choice – it Really isn’t. You Have to do Both.
Webinar produced by GRC World Forums in association with Archer
-
Webinar
Building the Foundations for Managing Privacy Risks at Square Enix
To meet new regulations, satisfy customers, and business demands, organisations need to improve their privacy program capabilities. This requires strong governance, process design, and technology to proactively identify and mitigate privacy risks when starting new business initiatives. The Privacy Impact Assessment (PIA) is key to successful privacy programs and holistic data strategies. When done well, PIAs can manage business risk, build trust with users, and ensure compliance with privacy laws.
-
Webinar
OT Cybersecurity for IT Professionals
Information technology (IT) professionals are sometimes asked to support their organization with its operational technology (OT) needs, often with little guidance. If that’s the case, do IT cybersecurity best practices translate well to OT environments? Let’s find out!
-
Webinar
10 Best Practices for Streamlining Your Third-Party Risk Management Workflows
Hundreds of third parties to manage, hundreds of assessments to send, thousands of risks to analyze – Sound familiar?
-
Webinar
Investigating Financial Crime and Fraud: Technology Showcase
Conducting investigations involving financial crimes such as fraud, money laundering, political corruption, insider trading or cybercrime, can be very complex.
-
Webinar
International Privacy Panel: The Good, The Bad, And The Ugly
Join our expert panel of international privacy and data protection professionals for an open and free-flowing discussion on the good, the bad, and the ugly in the privacy world!
-
Webinar
Rethinking the Marketing Tech Stack for Data Privacy
Marketing leaders are grappling with data and privacy challenges - a catalyst to rethink their tech stacks, customer experiences, and UX.
-
Webinar
The Role of Disclosures in Risk Assessment and Management
Conflicts of interest (COI) management is an integral element of ethics and compliance programs.
-
Webinar
What Comes Next After A Data Breach
While the global average cost of a data breach has increased to $4.24 million, the total cost isn’t just in data loss alone.
-
Webinar
Moving Beyond Metrics: Leveraging Technology to Streamline ESG Data & Impact
As organizations set sustainability goals and commit to reporting, how can they streamline and centralize data capture? What tools can be used for automation so that organizations can focus on their impact?
-
Webinar
Are You Prepared for CPRA? California’s Incoming Privacy Law
On January 1st, 2023, the California Privacy Rights Act (CPRA) will go into effect, expanding on the current CCPA. As a result, companies will be faced with requirements related to managing risks, similar to that of GDPR.
-
Webinar
Leapfrog from SA&T compliance-as-a-strategy, to actual behavior & culture change
Security remains plagued with the legacy of compliance-driven, security awareness & training tools and methods.
-
Webinar
UK’s Post-Brexit GDPR Reforms: What to Expect, How to Adapt
On January 1 2021, the UK formally and effectively left the European Union. As a result, the EU GDPR no longer applies in the UK. Currently, the UK DPA 2018 sets out the data protection framework in the UK. Are you UK-DPA compliant?
-
Webinar
Privacy 2.0 Session – Overcoming Key Challenges
In order to establish effective data privacy, governance or cyber security programs, you first need to truly understand your corporate data.
-
Webinar
Valid Proof of Consent: How to Cultivate Trust & Demonstrate Compliance
Data, trust and compliance are three big focus areas for businesses.
-
Webinar
Data Retention - The blind spot in your privacy program (MEA region)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Webinar
ISO 27001: What is changing and how it will impact you
Becoming ISO 27001 certified demonstrates that your Information Security Management System (ISMS) is aligned with documented standards and provides your customers with assurance regarding the security of these systems.
-
Webinar
Data Retention: Know your Data and let it go!
Data Retention and disposal requirements have been long oversimplified or underestimated and put aside by controllers to focus on other priorities of their Data Protection programs.
-
Webinar
The Privacy Evolution: Enabling Trusted Data Use
To the modern privacy professional, it may often seem that privacy law, guidance, and court rulings are at odds with the most common, fundamental business practices in today’s digital age. Data crossing borders, analytics, and the use of AI are commonplace in today’s enterprises, and that is unlikely to change no matter the regulatory environment.
-
Webinar
Vendor Due Diligence: Best Practices for Scoping Assessments
With more and more vendors to onboard and monitor post-contract, third-party risk teams can struggleto keep up with the assessment workload. Ultimately, many organizations are asking too manyunnecessary questions or not enough necessary questions.