Library – Page 25
-
Video
Exploring the Updates to ISO/IEC 27001
This panel will explore the updates to the ISO/IEC 27001 framework—what’s new? What stays the same? And what do organisations need to do to maintain compliance with the new version?
-
Video
The Dangers of AI-Driven Mass Surveillance
Artificial intelligence is driving huge improvements in fields as diverse as medicine and climate monitoring. But from biometric identification to “social credit” scoring systems, AI is also providing new ways for governments and large corporations to track and surveil people—with significant implications for their privacy and freedom.
-
Video
Can Privacy Enhancing Technologies (PETs) Solve the Data Transfer Puzzle?
The legal issues around data transfers continue to cause confusion and consume resources. Many believe the solution lies in Privacy Enhancing Technologies (PETs). The US and UK governments are even collaborating on an “innovation prize challenge” to encourage the development of PETs for data transfers.
-
Video
Beyond the US: A Look At Transfers to Other Third Countries
The focus on data transfers post-Schrems II has been squarely on the US. But the same rules apply to any third country without an adequacy decision.
-
Video
Data Protection Update: United Kingdom
The UK is set to overhaul its data protection and privacy rules, with changes to cookies, accountability and regulation all on the table.
-
Video
Insider Threats: Detecting and Mitigating the Threat From Within
Insider threats can lead to devastating security incidents—whether intentional or negligent, and perpetrated by a from a trusted employee, ex-employee, or contractor.
-
Video
Data Protection Update: United States
Connecticut and Utah joined the ranks of US states with a comprehensive privacy law this year. The privacy patchwork continues to stitch itself together—but how should privacy professionals respond. And is anyone still hoping for a federal privacy law?
-
Video
How to Manage Third-Party Risk in Your Supply Chain
Supply chain risks take many forms and can be devastating to your organisation if not properly mitigated. From cybersecurity to reputational and legal issues, managing risk among your vendors and other third parties can be a daunting task.
-
Video
Keeping Pace with Emerging Threats
Cyber criminals are leveraging innovative techniques and taking advantage of new security vulnerabilities. Organizations must evolve and adapt their defenses to protect against the next wave of cybersecurity threats.
-
Video
Secure SAP Development at the Speed of Digital Transformation
SAP applications are the cornerstone of business operations and have become a top attack vector for enterprises.The need for secure development and testing of applications have never been greater. Yet there is a lack of tools that sufficiently support SAP languages, components, and development environments, resulting in the use of manual code reviews which are error prone.
-
Video
The human element: Fixing the behaviors that lead to breaches
Cybercriminals continue to launch increasingly sophisticated social engineering attacks. Coupled with a rise in human error, it’s no surprise that 85% of today’s security breaches involve a human element.
-
Video
Conducting a Transfer Impact Assessment: Best Practice
The transfer impact assessment (TIA) might be among the most demanding of the GDPR’s requirements. Assessing the surveillance regime of a third country can be a daunting task even for an experienced legal department—not to mention the thousands of SMEs engaged in international data transfers.
-
Video
Choosing the Right Cybersecurity Framework
Implementing a cybersecurity framework is a great way to improve your company’s security posture. But there are a lot of frameworks to choose from, and their suitability varies depending on your company’s industry, size and resources.
-
Video
The ROI of Data Privacy
Turning privacy into a business enabler by raising data privacy awareness and business accountability with key GDPR requirements. Implementing a data privacy programme that will channel data privacy to boost revenue, market reputation & customer trust leading to a meaningful ROI. Video: The ROI of Data Privacy ...
-
Video
Re-Thinking Trusted Data
The explosive growth of data and the value it creates calls on data professionals to level up their programs to build, demonstrate, and maintain trust. The days of fine print, pre-ticked boxes, and data hoarding are gone and strong collaboration from data, privacy, marketing and ethics teams is necessary to design trustworthy data-driven practices.
-
Video
Data Retention and Minimisation: Best Practice
Getting data retention and minimisation right is crucial to ensuring effective data protection compliance. Only collecting the data you need, and only storing it for as long as required, significantly reduces the likelihood of a data breach or other violation.
-
Video
Building a Privacy Management Program
A privacy management programme must be well-informed, accesible, and dynamic enough to adapt to fast-changing requirements.
-
Video
How to Avoid Software Supply Chain Attacks
From Solarwinds to Kaseya to Log4j—the security risk from software supply chain attacks shows no sign of abating.
-
Video
Data Centres: Just How Bad Is the Environmental Impact?
Data minimisation and storage limitation are key principles of data protection. But alongside the impact on privacy, minimising the amount of personal data you’re processing has another benefit: reducing carbon emissions.
-
Video
NFTs: Just a Craze or Here to Stay?
Many non-fungible token (NFT) investors are not yet seeing the returns they hoped for. But some argue that the price of NFTs could rebound—and that the truly game-changing nature of NFTs has yet to be realised.