All GRC World Forums articles in July 2022 – Page 12

  • Nick Dunaway
    Profiles

    Nick Dunaway

    Chief Information Officer

  • Christian (Chris) Eidt
    Profiles

    Christian Eidt

    Interim Chief Information Officer

  • Robert Engstrom
    Profiles

    Robert Engstrom

    Deputy CISO-Compliance and Governance

  • Eric Ensminger
    Profiles

    Eric Ensminger

    Chief Information Officer

  • Verena Charvet
    Speakers

    Verena Charvet

    MBA, Consultant, Lawyer, Founder of/Head at Merlys.uk

  • Matt Collinge
    Speakers

    Matt Collinge

    Principal, Slalom

  • Best Practices for Detecting, Preventing and Recovering From Ransomware
    Video

    Best Practices for Detecting, Preventing and Recovering From Ransomware

    2022-07-05T16:11:00Z

    Ransomware continues to cause huge losses and harms across the globe. But taking a proactive approach to security and business continuity can reduce the likelihood of falling victim to an attack—and reduce the damage that occurs if you are targeted. 

  • #RISK
    Event

    About #RISK

    2022-07-05T16:10:00Z

    Europe’s Leading Risk Focused EXPO – November 16 & 17, ExCeL, London – “Risk is now everyone’s business”.

  • Exploring the Updates to ISO:IEC 27001
    Video

    Exploring the Updates to ISO/IEC 27001

    2022-07-05T16:03:00Z

    This panel will explore the updates to the ISO/IEC 27001 framework—what’s new? What stays the same? And what do organisations need to do to maintain compliance with the new version?

  • The Dangers of AI-Driven Mass Surveillance
    Video

    The Dangers of AI-Driven Mass Surveillance

    2022-07-05T16:00:00Z

    Artificial intelligence is driving huge improvements in fields as diverse as medicine and climate monitoring. But from biometric identification to “social credit” scoring systems, AI is also providing new ways for governments and large corporations to track and surveil people—with significant implications for their privacy and freedom. 

  • Can Privacy Enhancing Technologies (PETs) Solve the Data Transfer Puzzle?
    Video

    Can Privacy Enhancing Technologies (PETs) Solve the Data Transfer Puzzle?

    2022-07-05T15:07:00Z

    The legal issues around data transfers continue to cause confusion and consume resources. Many believe the solution lies in Privacy Enhancing Technologies (PETs). The US and UK governments are even collaborating on an “innovation prize challenge” to encourage the development of PETs for data transfers.

  • Beyond the US- A Look At Transfers to Other Third Countries
    Video

    Beyond the US: A Look At Transfers to Other Third Countries

    2022-07-05T15:05:00Z

    The focus on data transfers post-Schrems II has been squarely on the US. But the same rules apply to any third country without an adequacy decision.

  • Data Protection Update- United Kingdom
    Video

    Data Protection Update: United Kingdom

    2022-07-05T15:03:00Z

    The UK is set to overhaul its data protection and privacy rules, with changes to cookies, accountability and regulation all on the table.

  • Insider Threats- Detecting and Mitigating the Threat From Within
    Video

    Insider Threats: Detecting and Mitigating the Threat From Within

    2022-07-05T15:01:00Z

    Insider threats can lead to devastating security incidents—whether intentional or negligent, and perpetrated by a from a trusted employee, ex-employee, or contractor.

  • Data Protection Update- United States
    Video

    Data Protection Update: United States

    2022-07-05T14:59:00Z

    Connecticut and Utah joined the ranks of US states with a comprehensive privacy law this year. The privacy patchwork continues to stitch itself together—but how should privacy professionals respond. And is anyone still hoping for a federal privacy law?

  • How to Manage Third-Party Risk in Your Supply Chain
    Video

    How to Manage Third-Party Risk in Your Supply Chain

    2022-07-05T14:57:00Z

    Supply chain risks take many forms and can be devastating to your organisation if not properly mitigated. From cybersecurity to reputational and legal issues, managing risk among your vendors and other third parties can be a daunting task.

  • Keeping Pace with Emerging Threats
    Video

    Keeping Pace with Emerging Threats

    2022-07-05T14:55:00Z

    Cyber criminals are leveraging innovative techniques and taking advantage of new security vulnerabilities. Organizations must evolve and adapt their defenses to protect against the next wave of cybersecurity threats.

  • Secure SAP Development at the Speed of Digital Transformation
    Video

    Secure SAP Development at the Speed of Digital Transformation

    2022-07-05T14:53:00Z

    SAP applications are the cornerstone of business operations and have become a top attack vector for enterprises.The need for secure development and testing of applications have never been greater. Yet there is a lack of tools that sufficiently support SAP languages, components, and development environments, resulting in the use of manual code reviews which are error prone.

  • The human element- Fixing the behaviors that lead to breaches
    Video

    The human element: Fixing the behaviors that lead to breaches

    2022-07-05T14:17:00Z

    Cybercriminals continue to launch increasingly sophisticated social engineering attacks. Coupled with a rise in human error, it’s no surprise that 85% of today’s security breaches involve a human element.

  • Conducting a Transfer Impact Assessment- Best Practice
    Video

    Conducting a Transfer Impact Assessment: Best Practice

    2022-07-05T14:15:00Z

    The transfer impact assessment (TIA) might be among the most demanding of the GDPR’s requirements. Assessing the surveillance regime of a third country can be a daunting task even for an experienced legal department—not to mention the thousands of SMEs engaged in international data transfers.