Latest On Demand
-
Webinar
Connecting the dots: How OSINT can improve outcomes in financial crime investigations
Recent events have brought Open Source Intelligence (OSINT) more sharply into public consciousness. The increased availability of satellite imagery, social media, shipping data and a wide range of other sources has shaped our understanding of Russia’s invasion of Ukraine.
-
Webinar
UK Data Protection Index Panel
The UK Data Protection Index is produced by Data Protection World Forum and The DPO Centre.
-
Webinar
After the attack: There’s No Place for Guesswork in Cyber Attack Investigations (Nordic Benelux region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”
-
Webinar
After the attack: There’s No Place for Guesswork in Cyber Attack Investigations (South Europe region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Webinar
Data Retention - The blind spot in your privacy program (Nordic and Benelux region)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Webinar
Keeping pace with emerging threats: Summer 2022 Round-up
In this webinar, our threat intelligence team share some of the latest threats and trends they’ve uncovered, including cryptocurrency scams exploiting Ukrainian donation appeals, LinkedIn impersonation emails targeting job hunters, and zero-day exploits circulating on the dark web.
-
Webinar
Data Retention - The blind spot in your privacy program (DACH region)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Video
The Future of ERM: Technologies and Frameworks
From the artificial inteliigence models used to predict and detect risk to the ever-changing regulatory landscape, our last panel of the day will consider what the future holds for ERM.
-
Video
Creating a Robust Data Breach Management Policy
This session will consider the key elements of a data breach management policy, from detection and notification to mitigation and review stages.
-
Video
10 Essential Steps to Rethinking Risk Assessments
In this webinar, we’ll review risk assessment best practices businesses should consider based leading industry standards such as ISO 31000 and the Committee of Sponsoring Organizations of the Treadway Commission (COSO).
-
Video
Becoming a Better Leader in Enterprise Risk Management
This session will consider how to excel in leading an ERM team and demonstrating the value of your work to the board.
-
Video
Combatting ransomware with ServiceNow IRM, Security Operations, and Recorded Future
Join us for our webinar, Combatting Ransomware with ServiceNow IRM, Security Operations, and Recorded Future.
-
Video
Build Resilience to Minimise Risk
Our first panel will consider the fundamentals of organisational resilience and its relationship to enterprise risk.
-
Webinar
After the attack: Mitigating Organisational Impact of a Data Breach (DACH region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Webinar
Data Retention - The blind spot in your privacy program (Southern Europe region)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Webinar
How Successful Security Teams Manage Risk to Build Trust & Drive Growth
Abundant data is now available to put numbers behind what we instinctively know: trusted organizations are more successful. InfoSec teams have a prominent role in helping their organization become trusted, and therefore more successful: first and foremost, by communicating changes in the IT & security risk posture.
-
Webinar
Managing sanctions risk – The benefits of an intelligence-led approach?
The recent imposition of deep-cutting sanctions on the Russian Government and entities within the orbit of President Putin has exposed the limitations of traditional approaches to sanctions risk management. Recent news stories about the tactics being used by individuals targeted by these restrictions to maintain access to funds and assets make it clear that reliance on sanction screening alone, may not be sufficient.
-
Video
Third-Party Risk Masterclass: How to Calculate Inherent Risk
In this webinar, you’ll learn how to: Develop inherent risk calculations and a scoring methodology Tier your third parties by criticality and high risk Scope and schedule vendor assessments based on inherent risk scores
-
Webinar
The Next Step in Privacy Evolution: Maturing Your Privacy Program Through Automation, Intelligence & Governance
With expanding regulations, increased personal data use, and more informed consumers & employees, privacy professionals can no longer rely on manual workflows and out-of-date information to run their privacy programs.
-
Webinar
TRUST with Data Mesh
Do you want to empower your organization with access to trusted data but struggle to govern and manage data at sufficient speed and scale? Advances in data and cloud technology have addressed elements of data volume and processing power but having consistent agility to respond to change is a growing challenge.