Latest Resources – Page 57
-
Webinar
Private Healthcare: Why do you need intelligent email security?
Email is a vital communication tool for organisations globally. But email is the top security risk for healthcare providers as employees accidentally leak data everyday.
-
-
Webinar
What have we learned about Data Retention 3 years on from the GDPR?
The truth is many companies addressed their data retention obligations during the period of GDPR-readiness and have not circled back since.
-
Sponsored
OneTrust GRC - GRC Implementation Steps: Streamline Your IT Risk & Security Management Program
With constantly changing laws, regulations, and limited resources to stay on top of them, information security leaders often find it challenging to scale their risk and compliance programs. Having a clear understanding of “How compliant are we?” is a reoccurring question. However, scoping your compliance obligations is a foundational activity before you can start evaluating risk throughout your organization.
-
ebook
OneTrust GRC: Steering Your IT Risk Management Program
Cybersecurity in line with IT risk management is important for both your internal and external GRC execution. Forrester, a world-wide research and advisory firm, recently surveyed CEO’s to produce a new report, The Biggest Trends Shaping Enterprise Risk Management.
-
Webinar
OneTrust GRC: Building a GRC Program That Fits Your Business | A First Line Friendly ISMS Suite
How much time do you spend transferring data across systems to execute your GRC program? Oftentimes, disparate systems across policy, privacy, IT risk, vendor risk, incident, and audit result in duplicated data across applications.
-
Sponsored
OneTrust GRC: Are You Ready for Risk Quantification?
Are you ready for risk quantification? Follow this decision tree to understand if you’re ready for risk quantification today – or if not, what actions can you take to enhance insights today that will support risk quantification in the future!
-
Webinar
Data Retention: The Achilles Heel of Global Privacy
Consumers around the world are demanding more protection for their personal information. Data breaches are daily occurrences, and the scope of privacy has widened to include how your organization limits the risk of improper use or exposure of personal data.
-
Sponsored
4 Ways to Strengthen Cybersecurity for a Hybrid Workforce
Workplace tech used to be a lot more uniform: When you walked into an office, you likely saw an all-desktop-PC environment with a fairly consistent suite of software and tools, all used within the confines of a single network.
-
Webinar
GRC in 2021 - Demonstrate Value Fast with your Program
Today’s distributed, dynamic, and disrupted business has to navigate the velocity of risks which demands agility, resilience, and integrity.
-
Video
GRCTV: The Future Of Warfare & Cyber Threats
Access the on-demand videos below for GRC TV - The Future Of Warfare & Cyber Threats
-
Video
GRCTV - Privacy and data protection
Access the on-demand videos below from GRC TV privacy and data protection.
-
Video
What Do The New Standard Contractual Clauses (SCCs) Mean for Data Transfers Post-Schrems II?
The European Commission has adopted a newly updated version of the Standard Contractual Clauses (SCCs), which are the most commonly used legal mechanisms for transferring personal data and international companies rely upon this hugely.
-
Video
A Celebrity’s Desire for a Privacy Framework
We may envy their bank accounts, their houses, their cars and their lifestyle, but a celebrity almost signs a contract of constant availability and lack of privacy as their fame rises.
-
Video
A Fireside Chat with Johnny Ryan
Johnny Ryan, Author, Senior Fellow at Irish Council for Civil Liberties, and Open Markets Institute. Self proclaimed sufferer of “adtech remorse”.
-
Video
Where Does a CISO’s Role Go From Here?
Sudden digital transformation has put the role of the CISO in the spotlight with many in the cybersecurity industry suggesting that the title has become overused. Others may associate the role of the CISO as being innovation or cloud averse.
-
Video
Politics, Economics, Social: Russia’s State-Led Cyber Espionage and Influence Operations
Whether it be the SolarWinds attack, the 2016 US election interference, or a number of other cyber operations over the past few years, there’s a growing perception/reality that Russia is increasingly flexing its cyber muscles internationally, using the lessons its learned through years of focused cyber-attacks and influence operations in Ukraine and other regional adversaries.
-
Video
Confidential Computing: The Next, Great, Development in Data Protection
A recent IBM IBV study said 74% of CEOs think adoption of cloud will be critical for their businesses in the next two to three years.
-
Video
Third Party Risk Management: Regulatory Developments and the Impact on Vendor Risk Management (VRM)
Covid-19 has led to Enterprise organizations increasing their focus on Third Party Risk Management. But global regulatory developments have also had an effect upon companies challenges to do enough due-diligence to identify vendor risks.
-
Video
Improve Your Compliance and Reduce Expenditure: Data Retention Done The Right Way
Why do most organizations fail to make their data retention policies operational? A strong Data Retention Policy will provide benefits across legal and compliance activity, and reduce costs as well.