Library – Page 24
-
ebook
Anjuna: Protect Your Data Even If You Are Breached
Anjuna confidential computing software enables secure enclaves to secure data hardware-level encryption for end-to-end data protection.
-
Webinar
Solving Data Mapping with a no-code and automated approach to keep up with ever-increasing data sources and SAAS
Data volumes are increasing exponentially, and companies need seamless and trustworthy technology that will enable them to keep track of their data sources and know what PII is there.
-
Webinar
Data Retention: The Blind Spot in your Privacy Programme (Central & Eastern Europe)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Webinar
Data: New Gold or New Liability?
While corporate data has the potential to improve revenue, reduce expenses and mitigate risk, citizens around the world are demanding more protection for their personal information.
-
Webinar
The Human Element: Reducing Email Data Breaches By Combatting Human-Activated Risk
Did you know that 91% of cyberattacks are distributed by email and 82% of data breaches involve a human element?
-
Webinar
Data Retention - The blind spot in your privacy program (South Asia region)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Webinar
After the attack: There’s No Place for Guesswork in Cyber Attack Investigations (South Asia Edition)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Video
#RISK Founder Nick James in conversation with Gareth Tranter
Nick James, founder and event director of #RISK talks with Customer Success expert Gareth Tranter.
-
Webinar
Expert Webinar: Supplier Risk Management Best Practices
What best-practice techniques are employed to streamline supplier risk management processes – from vendor onboarding and enhanced due diligence to ongoing monitoring?
-
Webinar
Driving Accountability across the Organization with Cyber Risk Governance
Organisations are increasingly looking into setting a uniform standard for their cyber security programs that can sit across the entire structure. However, they first need to determine what standard is appropriate - and find a way to measure performance against it consistently.
-
Webinar
The CISO’s Role in ESG: Aligning with Your Business’ Goals
As investors, other companies, employees, customers, and other stakeholders increasingly look to ESG policies and metrics to make investment, business, and purchasing decisions, the role of compliance must expand
-
Report
Charting the UK Data Protection Profession: June 2022 Report
Data Protection World Forum and The DPO Centre are delighted to bring you the eighth Index survey report from the ground-breaking UK Data Protection Index.
-
Webinar
After the attack: Mitigating Organisational Impact of a Data Breach (Central & East Europe Region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Webinar
Keep Customer Trust: Manage & Automate your Consent Compliance & Data Governance
Trust takes years to build, seconds to break, and forever to repair.
-
Video
Best Practices for Detecting, Preventing and Recovering From Ransomware
Ransomware continues to cause huge losses and harms across the globe. But taking a proactive approach to security and business continuity can reduce the likelihood of falling victim to an attack—and reduce the damage that occurs if you are targeted.
-
Video
Exploring the Updates to ISO/IEC 27001
This panel will explore the updates to the ISO/IEC 27001 framework—what’s new? What stays the same? And what do organisations need to do to maintain compliance with the new version?
-
Video
The Dangers of AI-Driven Mass Surveillance
Artificial intelligence is driving huge improvements in fields as diverse as medicine and climate monitoring. But from biometric identification to “social credit” scoring systems, AI is also providing new ways for governments and large corporations to track and surveil people—with significant implications for their privacy and freedom.
-
Video
Can Privacy Enhancing Technologies (PETs) Solve the Data Transfer Puzzle?
The legal issues around data transfers continue to cause confusion and consume resources. Many believe the solution lies in Privacy Enhancing Technologies (PETs). The US and UK governments are even collaborating on an “innovation prize challenge” to encourage the development of PETs for data transfers.
-
Video
Beyond the US: A Look At Transfers to Other Third Countries
The focus on data transfers post-Schrems II has been squarely on the US. But the same rules apply to any third country without an adequacy decision.