Latest – Page 135
-
Feature
ESG World Forum Day 1: Exploring the “How” and the “Why” of ESG
Day 1 of the inaugural ESG World Forum took place on 7 Dec, bringing ESG and compliance professionals to discuss their vision of bringing about a cleaner, more ethical, and more sustainable world.
-
News
Microsoft Takes Control of Cybercrime Sites Following Court Order
A Virginia court has allowed Microsoft to seize websites operated by Nickel, a Chinese cybercrime group that has been conducting cyberattacks in 29 countries.
-
News
‘Family Safety’ App Selling Precise Location Data of Millions of Users
Life360, a family safety app, sells information about the whereabouts of millions of its users with “few safeguards to prevent the misuse of this sensitive information,” an investigation by The Markup has revealed.
-
ebook
It’s Time to Take the Ransomware Threat to Business-Critical Applications More Seriously
Almost every day, we see yet another case of ransomware. While, historically, companies of all sizes are targeted, recently it appears that all the news revolves around debilitating attacks on mission-critical or business-critical systems of large enterprises — from fuel and energy companies to food processing companies.
-
News
Irish Regulator Pushed for ‘Monetisation of Personal Data’ In Data Protection Guidelines, Documents Reveal
The Irish Data Protection Commission (DPC) pushed for a liberal interpretation of data protection law that would favour social media companies, newly-released documents reveal. The proposals were characterised by another regulator as “contrary to everything we believe in” and “(reducing) the GDPR to a pro forma instrument.”
-
-
ebook
ESG MANAGEMENT ESSENTIALS: Everything You Need to Get Started with ESG
THE ULTIMATE GUIDE TO ESG MANAGEMENT
-
News
UK Data Regulator Faces Possible Court Challenge Over Age Verification
A coalition of children’s charities has written to the UK’s data protection regulator, the Information Commissioner’s Office (ICO), demanding the mandating of age-checking processes on pornography websites.
-
ebook
Maximizing the digital opportunity with limitless data governance: Democratize data at scale with Informatica, Snowflake, and Deloitte
As we come out of crisis and into recovery, the economic landscape has been radically transformed. Businesses naturally want to take advantage of the digital opportunity, but they’re learning that the changes underway impact brand and reputation.
-
ebook
Trust your data and unleash value: Democratizing data at scale with Informatica, Snowflake, and Deloitte
Every business wants to realise full value from its business data, but a vital ingredient is often missing.
-
News
Ransomware attacks escalate through holiday period, study finds
A new study has identified a 30% leap in the average number of attempted attacks globally over the holiday season.
-
Video
Is Zero Trust Really The Next Big Step in Cybersecurity?
This panel will analyse whether Zero Trust really is an option every Enterprise organisation should consider for greater security and better auditing?
-
Video
Why the Council of Europe’s Police Surveillance Treaty is a Pernicious Influence on Latam Legal Privacy Frameworks
With panelists from EFF, Latin America and experts in Police Surveillance, this panel will look at why the EFF has made these recommendations and what will happen if no changes are made to this protocol across the region?
-
Video
Keynote: CPO of the Department of Homeland Security in the US, Lynn Dupree
This fireside chat between Lynn and Joel Schwarz will focus on digital identities and how decentralized identifiers can help separate identifiers from authenticators.
-
Video
The Chain of Trust in the Privacy Supply Chain
This session will discuss how Canadian organizations are reacting to these challenges, and what it means to rise to the privacy challenge for the supply chain.
-
Video
Leading the Change: key attributes for success in continuity & resilience
Building robust compliance, resilience and presilience culture in your organisation What are the key attributes for success and how can they be achieved?
-
Video
Securing Your Supply Chain; Reducing the Risk of Supply Chain Threats: Cybersecurity Best Practices
This panel will explore cybersecurity best practices from assessing current strategies and third party risk management, through to identification/encryption and zero trust frameworks.
-
Video
Lessons learnt from the Pandemic - How do we Enhance our Business Continuity Programmes in 2022?
This session looks at what businesses can do to enhance their business continuity programmes post lockdown and what they can put in place to mitigate any future risk.
-
Video
Ransomware and Healthcare: Why One Needs to be Amputated from the Other
This panel will talk about why healthcare is particularly vulnerable or sought after by hackers and what more the industry can do to both mitigate and prevent further attacks?
-
Video
Cyber resilience: business continuity and cyber incidents and how to address them
This session takes deep dive into how to address these threats and prepare for the future.