Library – Page 24
-
Sponsored
Exterro – Data Discovery: Revealing Data Skeletons in Your Closet
The principles of data minimisation and storage limitation aren’t just legal requirements. They’re crucial means of preventing data breaches and GDPR violations.
-
Video
#RISK Founder Nick James in conversation with Rory Stewart
Nick James, founder and event director of #RISK talks with academic, politician, and diplomat Rory Stewart.
-
Video
#RISK Founder Nick James in conversation with Matt Kunkel
Nick James, founder and event director of #RISK talks with LogicGate CEO Matt Kunkel.
-
Feature
Whistleblower Claims Regulators Weren’t Told About Twitter Security Risks — And Neither Was Twitter’s Board
Twitter’s former head of security, Peiter “Mudge” Zatko, made some serious allegations about the state of security and data protection in the company on Tuesday.
-
ebook
Anjuna: Protect Your Data Even If You Are Breached
Anjuna confidential computing software enables secure enclaves to secure data hardware-level encryption for end-to-end data protection.
-
Webinar
Solving Data Mapping with a no-code and automated approach to keep up with ever-increasing data sources and SAAS
Data volumes are increasing exponentially, and companies need seamless and trustworthy technology that will enable them to keep track of their data sources and know what PII is there.
-
Webinar
Data Retention: The Blind Spot in your Privacy Programme (Central & Eastern Europe)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Webinar
Data: New Gold or New Liability?
While corporate data has the potential to improve revenue, reduce expenses and mitigate risk, citizens around the world are demanding more protection for their personal information.
-
Webinar
The Human Element: Reducing Email Data Breaches By Combatting Human-Activated Risk
Did you know that 91% of cyberattacks are distributed by email and 82% of data breaches involve a human element?
-
Webinar
Data Retention - The blind spot in your privacy program (South Asia region)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Webinar
After the attack: There’s No Place for Guesswork in Cyber Attack Investigations (South Asia Edition)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
-
Video
#RISK Founder Nick James in conversation with Gareth Tranter
Nick James, founder and event director of #RISK talks with Customer Success expert Gareth Tranter.
-
Webinar
Expert Webinar: Supplier Risk Management Best Practices
What best-practice techniques are employed to streamline supplier risk management processes – from vendor onboarding and enhanced due diligence to ongoing monitoring?
-
Webinar
Driving Accountability across the Organization with Cyber Risk Governance
Organisations are increasingly looking into setting a uniform standard for their cyber security programs that can sit across the entire structure. However, they first need to determine what standard is appropriate - and find a way to measure performance against it consistently.
-
Webinar
The CISO’s Role in ESG: Aligning with Your Business’ Goals
As investors, other companies, employees, customers, and other stakeholders increasingly look to ESG policies and metrics to make investment, business, and purchasing decisions, the role of compliance must expand
-
Report
Charting the UK Data Protection Profession: June 2022 Report
Data Protection World Forum and The DPO Centre are delighted to bring you the eighth Index survey report from the ground-breaking UK Data Protection Index.
-
Webinar
After the attack: Mitigating Organisational Impact of a Data Breach (Central & East Europe Region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Webinar
Keep Customer Trust: Manage & Automate your Consent Compliance & Data Governance
Trust takes years to build, seconds to break, and forever to repair.
-
Video
Best Practices for Detecting, Preventing and Recovering From Ransomware
Ransomware continues to cause huge losses and harms across the globe. But taking a proactive approach to security and business continuity can reduce the likelihood of falling victim to an attack—and reduce the damage that occurs if you are targeted.