Information Security – Page 3
-
VideoShould Everyone Have a Digital Identity?
Governments worldwide are developing digital identity schemes that, they claim, will improve bureaucracy and ensure fairer access to state welfare. But privacy campaigners are skeptical about the prospect of every individual’s identity being digitised.
-
VideoWhy Effective Process and Governance is as Important as Technology When IAM issues arise
When IAM issues arise, organizations often lean too heavily on implementing technology with the idea that it will solve all issues related to identity and access.
-
VideoDigital Identity: Will We Ever See a World Without Passwords?
Even with good password management techniques, passwords are a flawed approach to account security. Many of the world’s major tech companies are proposing alternative mechanisms to verify identity and manage access. But what works best—and are there privacy trade-offs?
-
VideoVendor Risk Management: Can You Trust Vendor Risk Questionnaires?
Vendor risk management questionnaires are often seen as a vital part of the TRPM due diligence process. But how far can you trust your vendors’ responses?
-
VideoData Protection Update: Asia-Pacific
With a fast-developing and diverse set of laws and regulations, aligning your privacy program to ensure legal compliance across the APAC region can be a challenge.
-
VideoThe Future of ERM: Technologies and Frameworks
From the artificial inteliigence models used to predict and detect risk to the ever-changing regulatory landscape, our last panel of the day will consider what the future holds for ERM.
-
VideoCreating a Robust Data Breach Management Policy
This session will consider the key elements of a data breach management policy, from detection and notification to mitigation and review stages.
-
VideoPreventing Supply Chain Attacks: Best Practice
PrivSec Third-Party Risk will explore the ongoing threat of supply chain attacks and provide actionable advice on reducing your risk exposure.
-
VideoInternational Data Transfers: Your Biggest Unresolved Privacy Risk?
PrivSec Risk In Focus will speak to experts on data transfers and senior data protection professionals to discuss the steps your organisation should be taking to mitigate the risk of unlawful data transfers under the GDPR.
-
VideoCould Synthetic Data Solve Your Privacy Problems?
PrivSec Global will explore the possibilities of using synthetic data to ensure privacy, security and fairness in data processing.
-
VideoWorking with Law Enforcement After an Incident: Facts and Fictions
PrivSec Global will welcome representatives from the U.S. Department of Justice and the US Secret Service for a discussion on Law Enforcement actions after criminal activites reports.
-
VideoWhy Training Isn’t Enough: Human Errors and Why Cybersecurity Needs to be Enhanced
PrivSec Global will consider the fundamental security controls every company needs in addition to staff training.
-
VideoPhishing Attacks: Why Do Some People Always Take the Bait?
PrivSec Global will examine the current state of phishing, consider why some people always fall for phishing scams, and ask whether this is inevitable as technology and awareness improves.
-
VideoNon Fungible Tokens: Innovation vs Privacy and Security
This panel will provide an overview of how NFTs work, and will then delve deeper into the privacy and security issues around them.
-
VideoChina’s Data Protection Officer Recruitment Drive: How Ready is the People’s Republic of China for Half-a-Million DPOs?
PrivSec Global will explore how the PIPL is driving demand for Data Protection Officers (DPOs) in China, and what roles and responsibilities a DPO has under the PIPL.
-
VideoAdapting to LGPD: The Biggest Challenges and Opportunities
PrivSec Global will explore how businesses can adapt the the new law leverage LGPD compliance for a competitive advantage.
-
VideoA Culture of Vigilance and an Understanding of Risk: Cyber Resilience Strategies and Best Practices
PrivSec Global will speak to cybersecurity leaders on best practices for creating a company-wide strategy for cyber resilience.
-
VideoDigital Forensics: Collecting data in a virtual environment
The most notable challenge digital forensic investigators face today is the cloud environment. While cloud computing is incredibly beneficial to an organization, they are also challenging for forensics investigators.
-
VideoPrivacy, Security and AI Systems; Why Your Company Should Hire a Chief AI Ethics Officer
This panel will discuss the opportunities for this role, how the new CAIEO could work closely with the Data Protection Officer and Chief Information Security Officer as they develop their position and ensure AI is utilised in a trustworthy fashion.
-
VideoDeep-Sea Phishing: Why is Phishing Gaining Sophistication and What Can Businesses Do?
This panel will explore these terms, why phishing is becoming more sophisticated, and what businesses can do to mitigate and prevent phishing attacks from bottom to top.
- Previous Page
- Page1
- Page2
- Page3
- Page4
- Next Page


