Latest Resources – Page 25
-
Video
Re-Thinking Trusted Data
The explosive growth of data and the value it creates calls on data professionals to level up their programs to build, demonstrate, and maintain trust. The days of fine print, pre-ticked boxes, and data hoarding are gone and strong collaboration from data, privacy, marketing and ethics teams is necessary to design trustworthy data-driven practices.
-
Video
Data Retention and Minimisation: Best Practice
Getting data retention and minimisation right is crucial to ensuring effective data protection compliance. Only collecting the data you need, and only storing it for as long as required, significantly reduces the likelihood of a data breach or other violation.
-
Video
Building a Privacy Management Program
A privacy management programme must be well-informed, accesible, and dynamic enough to adapt to fast-changing requirements.
-
Video
How to Avoid Software Supply Chain Attacks
From Solarwinds to Kaseya to Log4j—the security risk from software supply chain attacks shows no sign of abating.
-
Video
Data Centres: Just How Bad Is the Environmental Impact?
Data minimisation and storage limitation are key principles of data protection. But alongside the impact on privacy, minimising the amount of personal data you’re processing has another benefit: reducing carbon emissions.
-
Video
NFTs: Just a Craze or Here to Stay?
Many non-fungible token (NFT) investors are not yet seeing the returns they hoped for. But some argue that the price of NFTs could rebound—and that the truly game-changing nature of NFTs has yet to be realised.
-
-
Video
Should Everyone Have a Digital Identity?
Governments worldwide are developing digital identity schemes that, they claim, will improve bureaucracy and ensure fairer access to state welfare. But privacy campaigners are skeptical about the prospect of every individual’s identity being digitised.
-
Video
Why Effective Process and Governance is as Important as Technology When IAM issues arise
When IAM issues arise, organizations often lean too heavily on implementing technology with the idea that it will solve all issues related to identity and access.
-
Video
Digital Identity: Will We Ever See a World Without Passwords?
Even with good password management techniques, passwords are a flawed approach to account security. Many of the world’s major tech companies are proposing alternative mechanisms to verify identity and manage access. But what works best—and are there privacy trade-offs?
-
Video
Vendor Risk Management: Can You Trust Vendor Risk Questionnaires?
Vendor risk management questionnaires are often seen as a vital part of the TRPM due diligence process. But how far can you trust your vendors’ responses?
-
Video
Data Protection Update: Asia-Pacific
With a fast-developing and diverse set of laws and regulations, aligning your privacy program to ensure legal compliance across the APAC region can be a challenge.
-
Webinar
Connecting the dots: How OSINT can improve outcomes in financial crime investigations
Recent events have brought Open Source Intelligence (OSINT) more sharply into public consciousness. The increased availability of satellite imagery, social media, shipping data and a wide range of other sources has shaped our understanding of Russia’s invasion of Ukraine.
-
Video
#RISK Founder Nick James in conversation with Oliver Bullough
Nick James, founder and event director of #RISK talks with financial crime journalist and author Oliver Bullough.
-
Webinar
The Next Generation of Female GRC Leaders: Senior Women Share Advice on Success and Progression
In this session, leaders in GRC roles share their experience of progression in their careers and what advice and guidance they would give to younger women to look at developing a career in Governance, Risk and Compliance.
-
Webinar
UK Data Protection Index Panel
The UK Data Protection Index is produced by Data Protection World Forum and The DPO Centre.
-
Webinar
After the attack: There’s No Place for Guesswork in Cyber Attack Investigations (Nordic Benelux region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”
-
Video
Was ist falsch an der DSGVO? Konstruktive Kritik von Datenschutzexperten
Die DSGVO wird zu Recht als Verbesserung der Datenschutzrechte in vielen Bereichen gefeiert. Aber das Gesetz wurde auch kritisiert – sowohl von „Big Tech“-Lobbyisten als auch von engagierten Datenschutzexperten.
-
Video
¿Qué tiene de malo el RGPD? Críticas constructivas de profesionales de la privacidad
El RGPD se celebra con razón por mejorar los derechos de protección de datos en muchas áreas. Pero la ley también ha sido criticada, tanto por cabilderos de “grandes tecnologías” como por profesionales dedicados a la privacidad.
-
Video
RGPD: 4 años después
Cuatro años después de la entrada en vigor del RGPD, el panorama de la privacidad sigue siendo tan complejo como siempre. Los últimos 12 meses han seguido siendo forjados con acción y un mayor sentido de conciencia de privacidad. Los desarrollos en el caso Schrems II y las implicaciones de privacidad del Coronavirus han resaltado un nuevo nivel de consideraciones de cumplimiento para que las organizaciones naveguen.