Latest Resources – Page 21
-
Webinar
UK’s Post-Brexit GDPR Reforms: What to Expect, How to Adapt
On January 1 2021, the UK formally and effectively left the European Union. As a result, the EU GDPR no longer applies in the UK. Currently, the UK DPA 2018 sets out the data protection framework in the UK. Are you UK-DPA compliant?
-
Video
#RISK Founder Nick James in conversation with Gemma O’Loghlen, BNP Paribas
Nick James, founder and event director of #RISK talks with Gemma O’Loghlen, the Chief of Staff of the Group Data Protection Office at BNP Paribas.
-
Webinar
Privacy 2.0 Session – Overcoming Key Challenges
In order to establish effective data privacy, governance or cyber security programs, you first need to truly understand your corporate data.
-
Video
#RISK Founder Nick James in conversation with Tharishni Arumugam, AON
Nick James, founder and event director of #RISK talks with Tharishni Arumugam, the Global Privacy Technology & Operations Director at AON.
-
ebook
Threat Detection, Defense & Remediation Using ASM
Imagine you’ve been blindsided by a cybersecurity attack that resulted in confidential data loss, monetary loss and reputation damage.
-
Webinar
Valid Proof of Consent: How to Cultivate Trust & Demonstrate Compliance
Data, trust and compliance are three big focus areas for businesses.
-
Webinar
Data Retention - The blind spot in your privacy program (MEA region)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Video
#RISK Founder Nick James in conversation with Dan Evans, former journalist & whistle-blower
Nick James, founder and event director of #RISK talks with Dan Evans, former Mirror Group and News UK journalist turned phone-hacking whistle-blower.
-
Webinar
ISO 27001: What is changing and how it will impact you
Becoming ISO 27001 certified demonstrates that your Information Security Management System (ISMS) is aligned with documented standards and provides your customers with assurance regarding the security of these systems.
-
Webinar
Data Retention: Know your Data and let it go!
Data Retention and disposal requirements have been long oversimplified or underestimated and put aside by controllers to focus on other priorities of their Data Protection programs.
-
Video
#RISK Founder Nick James in conversation with Richard Merrygold, iSTORM
Nick James, founder and event director of #RISK talks with Richard Merrygold, Director and Co-Founder of iSTORM.
-
Webinar
The Privacy Evolution: Enabling Trusted Data Use
To the modern privacy professional, it may often seem that privacy law, guidance, and court rulings are at odds with the most common, fundamental business practices in today’s digital age. Data crossing borders, analytics, and the use of AI are commonplace in today’s enterprises, and that is unlikely to change no matter the regulatory environment.
-
Video
Ultimate Beneficial Ownership - how to identify and verify cross-border UBOs
Beneficial ownership verification is now cemented as an essential component of client onboarding and anti-financial crime procedures. However, breaking down the complex company structures designed to conceal Ultimate Beneficial Ownership (UBO) – particularly when dealing with cross-border and multiple languages - represents a significant challenge for businesses.
-
Video
Marketing Compliance: Transform Digital Experiences in the Age of Privacy
The combination of customer demands, privacy laws, and technology changes is challenging teams to rethink leading-edge strategies. Instead of separating data, privacy, and marketing strategies, business leaders must treat these pillars as an interconnected ecosystem, synchronized from the ground up to reverse the fragmentation that exists in organizations today.
-
Video
Managing a Privacy Program Across Multiple Jurisdictions
The majority of major economies now have comprehensive data protection laws that apply with extraterritorial effect. Most of the remainder will have one soon. And within individual countries, organisations often face a complex mix of sectoral privacy laws. This makes managing a privacy program challenging.
-
Video
Towards a Cookie-Free Future
Third-party cookies are not dead yet, but Google has signed their death warrant. How will advertisers and publishers adapt to the cookie-free future?
-
Video
Accelerating Privacy Programs with Data Discovery
Data inventory is at the heart of all privacy and data protection; most companies rely on surveys and recollection as opposed to actual knowledge. Is your record of processing wishful thinking – do you really have an inventory based on evidence?
-
Video
The Data Protection and Privacy Risk Landscape
Change happens fast in data protection. With new threats to privacy and new regulatory risks arising every year, it’s time to take stock and take an overview of the risk landscape.
-
Video
Insider Threats: Safeguarding Your Organisation from the Inside Out
Much of the work of security professionals focuses on securing an organisation’s perimeter and keeping malicious actors out.
-
Video
Beating Social Engineering: Successfully Securing the “Human Layer”
The “human layer” is a key vulnerability in every organisation’s cyber security defences. Whether accidently or intentionally, a huge proportion of sucessful cyber attacks start begin with the actions of an insider.