Latest Resources – Page 4
-
Video
The Data Protection and Security Challenges in Mergers and Acquisitions
This panel will explore some of the scenarios where this can occur and discuss why companies are not more aware, the steps they can take to mitigate the situation, the impacts and positive opportunities post-breach.
-
Video
Privacy, Security and AI Systems: Automated Decision Making and Human Oversight
PrivSec Global will explore the legal and ethical dimensions of human oversight and automated decision-making and provide practical tips on how to fulfil your obligations.
-
Video
Aligning Risk & Performance Management
Access the on-demand video for The GRC Red Flag Series with Michael Rasmussen: Aligning Risk & Performance Management
-
Webinar
2022 Trend Watch: Realizing the Full Potential of SASE and Zero Trust
The events of 2021 have created a paradigm shift in cybersecurity. The steady cadence of large-scale cyber attacks have accelerated a move away from perimeter-focused security to Zero Trust. While core foundations of Zero Trust have been implemented, many tech leaders are still missing a critical piece of the puzzle for safeguarding their data.
-
Video
The GRC Red Flag Series with Michael Rasmussen - ES-G-RC - The Role of GRC in Delivering ESG
Access the on-demand video for The GRC Red Flag Series with Michael Rasmussen: ES-G-RC - The Role of GRC in Delivering ESG
-
ebook
Zero Trust Data Protection Across the Google Ecosystem
Cloud Security Best Practices for Business Leaders Guide
-
Video
Emerging Challenges in Cybersecurity: Implications of Biden’s executive order on supply chains and Third Party Risk Management
As detailed by PWC, “The supply chain order, like most of the policies proposed by the new Biden administration so far, takes a whole-of-government approach—emphasizing climate change, diversity, American jobs and cybersecurity.
-
Video
Social Media Data Breaches: Serious or Just a “Scrape”?
In August, Facebook suspended the accounts of NYU researchers who were investigating political ads on the social media platform.
-
Video
How easy is it to phish your business?
As cybersecurity and cyberthreats become more prevalent in our personal and working lives, businesses have invested in solutions like antivirus software and endpoint protection to try and secure their employees, data and intellectual property.
-
Video
Spotting the signs of insider risk – and stopping a security incident before it happens
When it comes to cybersecurity and the risks that go alongside it, we know that people aren’t perfect – they get hacked, they make mistakes, and they also break the rules.
-
Video
Phishing The Growing Threat to your Business
The remote working revolution has led to an increased threat from phishing. It is thought that around three-quarters of all companies have suffered some sort of phishing campaign in the past year.
-
Video
Artificial Intelligence/Machine Learning: How Can AI lead to a New Revolution in Cybersecurity
Artificial Intelligence and Machine Learning have radically affected the ways in which we work; within cybersecurity this is fascinating, as it will affect the ways in which cybercriminals operate as much as how security teams can evolve.
-
Video
Ransomware is not out of control, it is everything from cryptocurrencies to users
This panel will explore a controversial topic: what is more out of control at the moment, ransomware attacks or our susceptibility due to outside forces such as cryptocurrencies and the very users/staff of our companies?
-
Video
Ransomware Hacks: Are You and Your Vendors Vulnerable?
In recent months, supply chain attacks have made headlines and wreaked havoc across businesses. These attacks, which often use ransomware, can impact thousands of organizations by targeting a single company.
-
Video
Insider/Internal Threats: Why Boards Should Never Take This for Granted
From employees accidentally clicking on malicious links, to sabotage, theft of data and unauthorised access, companies have plenty of potential insider cybersecurity threats to consider.
-
Video
Speaking Different Languages: What Data Protection & Privacy and Security departments have to learn about each other
Whether it be the coalescing of both security and privacy in the CISO office, or questions about where a Privacy Office fits and whether it incorporates Risk, Legal, Compliance and Engineering, there are so many things that Data Protection/Privacy and Security offices can learn from each other as they look to come out of their silos and work together more closely to support their organisations.
-
Video
Emerging Challenges in Cybersecurity: Lessons Learned and Actionable Steps to Protect Your Organization
SolarWinds had many high-profile clients, deeply affected by the hack; this has been followed by other hacks in 2021 such as the Colonial Pipeline, Microsoft Exchange server, Facebook, Air India and more.
-
Webinar
Superior, smart and simple; how machine learning is welcoming a new era of data loss prevention
It is widely acknowledged that human error is the leading cause of data breaches. Arming your people with smart solutions to prevent security incidents should be a top priority in our new world of remote working.
-
ebook
The Complete Guide to Business Privacy
Your Organization’s Greatest Responsibility & Opportunity
-
ebook
Managing Security for a Hybrid Workforce
A Guide to Ensuring Email and File Protection Across Platforms