All articles by GRC World Forums – Page 6
-
VideoManaging Cross-Border Financial Crime and Anti-Money Laundering Risks
This session will help you gain a better understanding of the risks and opportunities of managing cross-border financial crime and AML risks and will provide the knowledge and tools you need to manage these risks in your own organisation.
-
VideoThe Future of Cybersecurity Law and Regulation: Emerging Trends and Challenges
This session will help you better understand the present and future legal landscape in cybersecurity so you can prepare and help balance your organisation’s resources and priorities.
-
VideoKeeping pace with cybersecurity by scaling IT governance and data risk management
Video: Keeping pace with cybersecurity by scaling IT governance and data risk management
-
VideoSubject Access Requests: Respecting Data Rights While Saving Time and Resources [Sponsored by Zivver & OneTrust]
This session will focus on creating a streamlined approach to data governance that allows for timely and comprehensive responses to subject access requests.
-
VideoHow to measure the effectiveness of your privacy program [Sponsored by Privacy Culture]
It is crucial to have an effective privacy program in place that can ensure compliance with regulations, manage privacy risks, and build trust with customers and stakeholders. After 5 years of GDPR, measuring the effectiveness of your privacy program continues to be a complex and challenging task as privacy professionals argue that they face various challenges when it comes to measuring privacy effectiveness.
-
VideoPrivacy, Security and Digital Policy Update: UK [Sponsored by OneTrust]
The UK government repeatedly namechecks data protection as one area in which the country could capitalise on its departure from the EU. But opinions vary as to whether the reform proposals will be effective or meaningful.
-
WebinarPutting Data Privacy at the Core of Customer Connections
It’s the beginning of 2023, and the privacy ecosystem and digital world are changing rapidly and are merging closer together. The combination of customer demands, privacy laws and technology changes are challenging teams to rethink leading-edge strategies.
-
WebinarOT Cybersecurity for IT Professionals
Information technology (IT) professionals are sometimes asked to support their organization with its operational technology (OT) needs, often with little guidance. If that’s the case, do IT cybersecurity best practices translate well to OT environments? Let’s find out!
-
NewsPICCASO Privacy Awards Winners Announced: Celebrating the Brightest and Best in Data Protection
On Thursday December 8th 2022, the inaugural PICCASO Privacy Awards celebrated the people and organisations making an incredible contribution to the fields of privacy and data protection.
-
Webinar10 Best Practices for Streamlining Your Third-Party Risk Management Workflows
Hundreds of third parties to manage, hundreds of assessments to send, thousands of risks to analyze – Sound familiar?
-
WebinarInvestigating Financial Crime and Fraud: Technology Showcase
Conducting investigations involving financial crimes such as fraud, money laundering, political corruption, insider trading or cybercrime, can be very complex.
-
NewsParliament to discuss Online Safety Bill following five-month delay
The UK’s much-anticipated action on regulating the internet is to be addressed in parliament next week, with child protection and free speech coming to the fore of debate.
-
VideoPrivacy Risk Assessments in the US: Why, When, and What?
A standard practice from other global privacy laws has hit the US: privacy risk or data protection assessments (commonly known as PIAs) are now required under certain criteria for the processing of personal data in all new state laws, except Utah. Beyond regulatory compliance, a comprehensive and integrated assessment program embeds privacy by design into your organization’s data strategy and enables you to manage risk at scale.
-
VideoChildren’s Privacy: Steps Towards a Less Data-Hungry Web for Kids
Regulators worldwide are getting serious about children’s privacy. From the “children’s codes” established in jurisdictions like the UK and Califorina, to the recent enforcement action against Instagram and TikTok—it’s becoming increasingly clear that the web is likely to change so that children are better protected.
-
VideoLeveraging Data in your Ethics and Compliance Programs
Ethics and compliance programs have more data available to them than ever before. Capturing data on program activity and impact can be a powerful tool to assess whether your ethics and compliance program works in practice. Many companies also find value in benchmarking their programs against industry norms and in response to risks. That said, data’s nascency in the ethics and compliance space means we are still struggling to understand what to do with all this data, and how to know what it is telling us.
-
WebinarInternational Privacy Panel: The Good, The Bad, And The Ugly
Join our expert panel of international privacy and data protection professionals for an open and free-flowing discussion on the good, the bad, and the ugly in the privacy world!
-
WebinarRethinking the Marketing Tech Stack for Data Privacy
Marketing leaders are grappling with data and privacy challenges - a catalyst to rethink their tech stacks, customer experiences, and UX.
-
VideoShould Data Protection Experts Also Be AI Experts?
AI is advancing fast, and playing an increasingly important role in many organisations’ operations and business models.
-
VideoInsider Threats and Accidental Disclosure: The Biggest Causes of Data Breaches?
Much of the work of security professionals focuses on securing an organisation’s perimeter and keeping malicious actors out. But one of the most significant threats to privacy and security is accidental disclosure of data by employees.
-
VideoUnifying Privacy Management and Information Security Compliance: Building a Bridge to Improved Efficiency
The work of privacy and security professionals looks quite different day-to-day. But these two disciplines share a lot in common, and there are areas where working in silos does not best serve the interests of employees, organisations or even users.



