Latest Resources – Page 2
-
Video
How to Avoid Software Supply Chain Attacks
From Solarwinds to Kaseya to Log4j—the security risk from software supply chain attacks shows no sign of abating.
-
Video
Why Effective Process and Governance is as Important as Technology When IAM issues arise
When IAM issues arise, organizations often lean too heavily on implementing technology with the idea that it will solve all issues related to identity and access.
-
Video
Digital Identity: Will We Ever See a World Without Passwords?
Even with good password management techniques, passwords are a flawed approach to account security. Many of the world’s major tech companies are proposing alternative mechanisms to verify identity and manage access. But what works best—and are there privacy trade-offs?
-
Video
Vendor Risk Management: Can You Trust Vendor Risk Questionnaires?
Vendor risk management questionnaires are often seen as a vital part of the TRPM due diligence process. But how far can you trust your vendors’ responses?
-
Webinar
After the attack: There’s No Place for Guesswork in Cyber Attack Investigations (Nordic Benelux region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”
-
Video
Improving Organisational Resilience
PrivSec Risk in Focus will consider the best practices for managing overall organisational resilience and ask risk management experts what they’ve learned from the past few chaotic years.
-
Webinar
After the attack: There’s No Place for Guesswork in Cyber Attack Investigations (On-Demand)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Webinar
Wait a minute, whose data is that?! Uncovering your biggest data governance, security and privacy risks
In order to establish effective governance, privacy, or security programs, you first need to truly understand your data. What data do you store? Who owns it? Where is it located? Who has access to it? What regulations apply to it? Can you quickly and easily respond to data requests? Without a robust data inventory and understanding these types of questions, there is a limited chance of success achieving any Legal GRC objective.
-
ebook
Executive Summary: ICS/OT Cybersecurity Year In Review 2021
Get what you need to know quickly to protect your critical assets by reading the Executive Summary of the 2021 ICS/OT Year in Review.
-
Podcast
Onapsis Podcast: 4 Things to Consider as You Select a Vulnerability Management Provider
The PrivSec Podcast is a series of discussions that covers the complete privacy, data protection and security spectrum, featuring subject matter experts.
-
Video
Working with Law Enforcement After an Incident: Facts and Fictions
PrivSec Global will welcome representatives from the U.S. Department of Justice and the US Secret Service for a discussion on Law Enforcement actions after criminal activites reports.
-
Video
Why Training Isn’t Enough: Human Errors and Why Cybersecurity Needs to be Enhanced
PrivSec Global will consider the fundamental security controls every company needs in addition to staff training.
-
Video
Cyber Threat Intelligence 101: Do’s, Dont’s, and Best Practices
PrivSec Global will explain and explore the field of cyber threat intelligence: How to keep track of—and defend against—the huge variety of existing and novel threats.
-
Video
4 Reasons Why You Need Vulnerability Management for Business-Critical Applications
A deep dive into the current environmental and business dynamics that your cybersecurity portfolio must account for. Understand the novel, emergent threats that the Onapsis Research Lab is observing and reporting on.
-
Video
A Culture of Vigilance and an Understanding of Risk: Cyber Resilience Strategies and Best Practices
PrivSec Global will speak to cybersecurity leaders on best practices for creating a company-wide strategy for cyber resilience.
-
Video
Managing Vendors: Systemising and Automating Your Vendor Risk Management Process
PrivSec Global will explore how organisations can use automation to create a more efficient and effective approach to VRM.
-
Video
Habeas Data: The Developing Latin American Privacy, Data Protection, and Security Landscape
PrivSec Latin America will explore the regulatory landscape across the Latin American region—considering where the strongest data protection, privacy, and security laws exist; where such laws are in development; and which countries are lagging behind in terms of legal reforms.
-
Video
Biometric Identification: Is Latin America Sleepwalking Towards Widespread Biometric Surveillance?
Is Latin America becoming a region where submitting to biometric identification is unavoidable? PrivSec Latin America will examine the legal, ethical, and technical dimensions of this controversial method of identifying and surveilling individuals.
-
Video
How to Fight Back Against Latin America’s Cybercrime Outbreak
While no region is spared by cybercriminals, Latin America has been hit particularly hard by phishing, ransomware, and other cybercrimes.