Latest Resources – Page 3
-
Video
South Africa Cybercrimes Act: How Will the Law Impact South African Businesses?
South Africa’s Cybercrimes Act passed in May 2021 but has yet to come into force. The law creates new criminal offences for many cyber crimes, including hacking, ransomware, and cyber forgery.
-
ebook
It’s Time to Take the Ransomware Threat to Business-Critical Applications More Seriously
Almost every day, we see yet another case of ransomware. While, historically, companies of all sizes are targeted, recently it appears that all the news revolves around debilitating attacks on mission-critical or business-critical systems of large enterprises — from fuel and energy companies to food processing companies.
-
Video
Why the Council of Europe’s Police Surveillance Treaty is a Pernicious Influence on Latam Legal Privacy Frameworks
With panelists from EFF, Latin America and experts in Police Surveillance, this panel will look at why the EFF has made these recommendations and what will happen if no changes are made to this protocol across the region?
-
Video
Keynote: CPO of the Department of Homeland Security in the US, Lynn Dupree
This fireside chat between Lynn and Joel Schwarz will focus on digital identities and how decentralized identifiers can help separate identifiers from authenticators.
-
Video
Privacy, Security and AI Systems; Why Your Company Should Hire a Chief AI Ethics Officer
This panel will discuss the opportunities for this role, how the new CAIEO could work closely with the Data Protection Officer and Chief Information Security Officer as they develop their position and ensure AI is utilised in a trustworthy fashion.
-
Video
Data and Security in Emerging Technologies: Securing Your IoT Ecosystem
Join our panel of experts as they discuss the most important steps in safeguarding the privacy and security of your IoT network.
-
Video
Privacy, Security and AI Systems; AI Systems and Social Justice: The Great Battle for Human Rights
There are a number of recent examples of human rights violations linked to advances in AI - whether it be algorithms that were created to regulate speech online that have censored commentary on religion or sexual orientation, or AI systems invented to assess illegal activities being used to track and target human rights defenders
-
Video
Staff Working from Abroad: What Are the Data Protection and Security Implications?
This panel will explore the Data Protection & Privacy and Data Security implications from data flow mapping exercises to data protection impact assessments, and what would be the best practices with staff working remotely in other countries from the Head Office.
-
Video
The Data Protection and Security Challenges in Mergers and Acquisitions
This panel will explore some of the scenarios where this can occur and discuss why companies are not more aware, the steps they can take to mitigate the situation, the impacts and positive opportunities post-breach.
-
Video
Privacy, Security and AI Systems: Automated Decision Making and Human Oversight
PrivSec Global will explore the legal and ethical dimensions of human oversight and automated decision-making and provide practical tips on how to fulfil your obligations.
-
Video
Aligning Risk & Performance Management
Access the on-demand video for The GRC Red Flag Series with Michael Rasmussen: Aligning Risk & Performance Management
-
Webinar
2022 Trend Watch: Realizing the Full Potential of SASE and Zero Trust
The events of 2021 have created a paradigm shift in cybersecurity. The steady cadence of large-scale cyber attacks have accelerated a move away from perimeter-focused security to Zero Trust. While core foundations of Zero Trust have been implemented, many tech leaders are still missing a critical piece of the puzzle for safeguarding their data.
-
Video
The GRC Red Flag Series with Michael Rasmussen - ES-G-RC - The Role of GRC in Delivering ESG
Access the on-demand video for The GRC Red Flag Series with Michael Rasmussen: ES-G-RC - The Role of GRC in Delivering ESG
-
ebook
Zero Trust Data Protection Across the Google Ecosystem
Cloud Security Best Practices for Business Leaders Guide
-
Video
Emerging Challenges in Cybersecurity: Implications of Biden’s executive order on supply chains and Third Party Risk Management
As detailed by PWC, “The supply chain order, like most of the policies proposed by the new Biden administration so far, takes a whole-of-government approach—emphasizing climate change, diversity, American jobs and cybersecurity.
-
Video
Social Media Data Breaches: Serious or Just a “Scrape”?
In August, Facebook suspended the accounts of NYU researchers who were investigating political ads on the social media platform.
-
Video
How easy is it to phish your business?
As cybersecurity and cyberthreats become more prevalent in our personal and working lives, businesses have invested in solutions like antivirus software and endpoint protection to try and secure their employees, data and intellectual property.
-
Video
Spotting the signs of insider risk – and stopping a security incident before it happens
When it comes to cybersecurity and the risks that go alongside it, we know that people aren’t perfect – they get hacked, they make mistakes, and they also break the rules.
-
Video
Phishing The Growing Threat to your Business
The remote working revolution has led to an increased threat from phishing. It is thought that around three-quarters of all companies have suffered some sort of phishing campaign in the past year.
-
Video
Artificial Intelligence/Machine Learning: How Can AI lead to a New Revolution in Cybersecurity
Artificial Intelligence and Machine Learning have radically affected the ways in which we work; within cybersecurity this is fascinating, as it will affect the ways in which cybercriminals operate as much as how security teams can evolve.