Latest Resources – Page 5
-
Video
Navigating Data Security in the Cloud
An overwhelming number of businesses today are choosing the cloud to host software applications, govern IT workloads, and assist with facilitating rapid technology innovation. Unfortunately, along with the cloud comes ambiguity regarding data security responsibilities.
-
Video
Third Party Risk Management: Cybersecurity Expertise into Board Governance and a Company’s Digital Defense
As companies the world over grapple with the rising cyber security threat, is it now time to have a director in charge of cybersecurity in the boardroom? If so, how do you ensure you find the right person.
-
Video
Managing Cybersecurity Challenges in Digital Transformation Projects
Design and technology projects can involve heavy use of IT software by a wide group of people, making them a potential target for cyberattackers.
-
Video
Multi-Factor Authentication and the Roadmap to an Organisation’s Increased Security
Multi-factor authentication is becoming more widespread as a key tool in the cyber security armoury.
-
Video
Business Through the Prism of Cyber
When integrating a new technology into your organization, engaging in or trying to mitigate third party risk, one must think of its cyber hygiene. It starts with understanding where your vulnerabilities are, and how you can efficiently manage it
-
Video
IT vs OT: Is There Too Much Operational Technology Online for Hackers?
The attack on the Colonial Pipeline was one of the most major hacks in the history of critical infrastructure. But, this was not a hack on Colonial Pipeline’s IT, but their Operational Technology. The pipeline, which normally carries 2.5m barrels a day, is digital in terms of its operations.
-
Video
Women and Diversity in Cybersecurity: Why Are We Still Having this Conversation?
Recent research by Tessian found that a higher proportion of young men were likely to consider a career in cyber security than young women.
-
Video
Engaging Your Line of Business for Cybersecurity Initiatives
Security cannot be done in a silo. The extent and nature of data shared across line of business functions both internally and externally fuels instances of system and organizational vulnerabilities.
-
Video
Internal Threats: Top Threats to your IT Security and how to Address Them
From employees accidentally clicking on malicious links, to sabotage, theft of data and unauthorised access, companies have plenty of potential insider cyber security threats to consider.
-
Video
How to Prevent Credential Stuffing Attacks While Managing Risk and Trust
Credential stuffing is a brute force attack that can be low-risk, high-reward for cyber criminals. This panel will debate the defence techniques that can be used to guard against this threat.
-
Video
The GRC Red Flag Series with Michael Rasmussen - GRC Orchestrate with ING
Access the on-demand video for The GRC Red Flag Series with Michael Rasmussen: GRC Ochestrate featuring ING
-
Webinar
Beyond the Perimeter: A New Data-Centric Model for Breach Preparedness and Rapid Response
For decades, technology leaders have focused on building a strong perimeter around their networks. But that approach to cybersecurity is no longer sustainable or effective: Globally distributed teams and supply chains have dramatically changed the way organizations create, store, and share data.
-
Video
Tackling the FinTech Regulatory Landscape: Addressing Challenges in Privacy, Compliance and Cybersecurity
Fintech has disrupted the financial sector dramatically over the past few years. With new, fast services, increased connectivity it has enabled the industry to be quicker and more agile.
-
Video
Deciphering the Data Security Implications of Schrems II
The Schrems II ruling has created serious implications for data privacy around the globe, forcing organisations to understand its ramifications for their data security strategies.
-
Video
Corporate Social Responsibility, ESG Programs and Personal Data Management
Join Manetu and Which? as they discuss CSR, ESG investing, how security, transparency, and control of personal information will affect companies’ customer relationships and corporate value.
-
Video
The UK Cyber Security Council: Perspectives on the role of the CISO
The UK Cyber Security Council: Perspectives on the role of the CISO The newly formed UK Cyber Security Council will discuss the changing role of the CISO, whether it is important or essential for qualifications and certifications for the role.
-
Video
LATAM Data Privacy Roundup: Harmonising Compliance Across the Region (Sponsored by 1Touch.io)
Brazil’s LGPD was the most talked about data privacy regulation in recent years in the LATAM region with plans for it to come into effect 2021.
-
Video
Creating a PrivSec Cross-Functional Alliance
Cross-team collaboration to promote privacy in the workplace is essential to mitigate organisations’ risk.
-
Video
Eliminating Complexities: The Power of Control-Based Privacy
The velocity of change in the privacy landscape makes it difficult for privacy leaders to keep up with new and ever-changing laws and regulations.
-
Video
The Role of CISO: How to Succeed as a Security Leader
- How the role of CISO has evolved in recent years and what is expected of CISOs in 2021