Latest Resources – Page 50
-
Sponsored
OneTrust GRC - GRC Implementation Steps: Streamline Your IT Risk & Security Management Program
With constantly changing laws, regulations, and limited resources to stay on top of them, information security leaders often find it challenging to scale their risk and compliance programs. Having a clear understanding of “How compliant are we?” is a reoccurring question. However, scoping your compliance obligations is a foundational activity before you can start evaluating risk throughout your organization.
-
ebook
OneTrust GRC: Steering Your IT Risk Management Program
Cybersecurity in line with IT risk management is important for both your internal and external GRC execution. Forrester, a world-wide research and advisory firm, recently surveyed CEO’s to produce a new report, The Biggest Trends Shaping Enterprise Risk Management.
-
Sponsored
OneTrust GRC: Are You Ready for Risk Quantification?
Are you ready for risk quantification? Follow this decision tree to understand if you’re ready for risk quantification today – or if not, what actions can you take to enhance insights today that will support risk quantification in the future!
-
Sponsored
4 Ways to Strengthen Cybersecurity for a Hybrid Workforce
Workplace tech used to be a lot more uniform: When you walked into an office, you likely saw an all-desktop-PC environment with a fairly consistent suite of software and tools, all used within the confines of a single network.
-
Video
GRCTV: The Future Of Warfare & Cyber Threats
Access the on-demand videos below for GRC TV - The Future Of Warfare & Cyber Threats
-
Video
GRCTV - Privacy and data protection
Access the on-demand videos below from GRC TV privacy and data protection.
-
Video
What Do The New Standard Contractual Clauses (SCCs) Mean for Data Transfers Post-Schrems II?
The European Commission has adopted a newly updated version of the Standard Contractual Clauses (SCCs), which are the most commonly used legal mechanisms for transferring personal data and international companies rely upon this hugely.
-
Video
A Celebrity’s Desire for a Privacy Framework
We may envy their bank accounts, their houses, their cars and their lifestyle, but a celebrity almost signs a contract of constant availability and lack of privacy as their fame rises.
-
Video
A Fireside Chat with Johnny Ryan
Johnny Ryan, Author, Senior Fellow at Irish Council for Civil Liberties, and Open Markets Institute. Self proclaimed sufferer of “adtech remorse”.
-
Video
Where Does a CISO’s Role Go From Here?
Sudden digital transformation has put the role of the CISO in the spotlight with many in the cybersecurity industry suggesting that the title has become overused. Others may associate the role of the CISO as being innovation or cloud averse.
-
Video
Politics, Economics, Social: Russia’s State-Led Cyber Espionage and Influence Operations
Whether it be the SolarWinds attack, the 2016 US election interference, or a number of other cyber operations over the past few years, there’s a growing perception/reality that Russia is increasingly flexing its cyber muscles internationally, using the lessons its learned through years of focused cyber-attacks and influence operations in Ukraine and other regional adversaries.
-
Video
Confidential Computing: The Next, Great, Development in Data Protection
A recent IBM IBV study said 74% of CEOs think adoption of cloud will be critical for their businesses in the next two to three years.
-
Video
Third Party Risk Management: Regulatory Developments and the Impact on Vendor Risk Management (VRM)
Covid-19 has led to Enterprise organizations increasing their focus on Third Party Risk Management. But global regulatory developments have also had an effect upon companies challenges to do enough due-diligence to identify vendor risks.
-
Video
Improve Your Compliance and Reduce Expenditure: Data Retention Done The Right Way
Why do most organizations fail to make their data retention policies operational? A strong Data Retention Policy will provide benefits across legal and compliance activity, and reduce costs as well.
-
Video
The Cybersecurity Workforce, Knowledge, and Skill Gaps
The security industry has been facing growing gaps in workforce as well as knowledge andskills. While dropping in 2020, the difficulties in recruiting quality talent as well as trainingand retaining cybersecurity professionals are still major hurdles in driving successfulcybersecurity programs and operations.
-
Video
Web, Mobile, OTT & CTV: How to Make Consent & Privacy an Asset, Not a Hurdle
It’s no secret that we’re living in multi-device world. Never before have we been able to watch, listen to, download, and read the content we want, on the devices we own. At the same time, consumers are extremely conscious about their privacy and digital footprint.
-
Video
Keynote: Max Schrems
Austrian privacy campaigner Max Schrems is best known as the man who held Facebook to account for its treatment of EU users’ personal data—and brought down two transatlantic privacy frameworks in the process.
-
Video
Retail: The Future of Consumer Data Protection
The tech market is showing that it is getting more serious about consumer data privacy, with a new wave of privacy restrictions on the horizon.
-
Video
How Do Data Protection Regulations Apply to AI and is GDPR Ready for Facial Recognition?
This panel will explore the relationship between Artificial Intelligence/Machine Learning and Data Protection Regulations, as well as discussing some of the most important points in relation to GDPR and Facial Recognition.
-
Video
Why Do Cars Need Brakes? Questioning the Need for Regulation
A car needs brakes to enable it to go faster! The same analogy can be applied to the need for regulation, for as technology grows, gains speed, and pushes envelopes, regulation acts as the brakes enabling this exciting expansion.