Library – Page 59
-
Webinar
Hidden Challenges of Data Retention & Minimization
With technological data innovations comes a plethora of new data, and companies are being overwhelmed with enterprise data which can be a liability.
-
Sponsored
Ransomware: when your data backup is your last line of defence, make it count
Not all data backups are created equal.
The cyber-threat landscape is ever evolving, and undoubtedly one of the biggest current threats is ransomware. Ransomware is a type of malicious software that threatens to publish the victim’s data, or perpetually block access to it, unless a ransom is paid. For modern organizations who rely on data to operate and thrive, this kind of attack can be catastrophic. A recent global report from Sophos found that the average cost of paying a ransom was $1.4 million, or $730,000 in equivalent loss of revenue owing to downtime should they choose not to. -
Video
Building an effective security strategy for privacy
Information, data privacy and security concerns are a persistent trend and central to all too many political and ethical scandals, data privacy has become one of the defining social and cultural issues today.
-
Video
Data lifecycle management challenges
One of the main challenges faced by companies involves adequately managing the information at hand, which is essential when making the right decisions.
-
Video
Shaping the Future of Data Privacy Globally
A look at compliance challenges faced by globally-data driven businesses relying on international data transfers.
-
Video
Data Management and Protection as a Service (DPaaS) to improve business continuity within your organisation
According to a report published by Transparency Market Research, the market for Data Protection as a Service (DPaaS) is expected to reach $46 billion by 2024.
-
Video
Getting to grips with the very real threat of modern ransomware and its impact on organisations
Infrastructure and operations leaders responsible for data protection must evaluate new ransomware protection features as critical prerequisites when choosing backup platforms.
-
Video
Ransomware Jail. Is There Any Way Out?
Tired of seeing non-stop ransomware news and trying to understand how it got to this point?
-
Video
Protecting privacy and ensuring data flows
How do companies leverage data flows to conduct everyday operations?
-
Video
Getting to grips with increased data management complexity in a post-Pandemic world
In an age of unprecedented change and complexity, managing data complexity is easier this is easier said than done.
-
Video
Meeting Identity and Access Management Challenges in the Era of Mobile and Cloud
Organisations are flocking to cloud services and mobile devices to cut costs and boost productivity.
-
Video
Outlining Effective Performance metrics provide transaction-level reporting to measure efficiency of services and projects
Many organisations lack defined metrics that report on the status and maturity of an IAM environment, such as enterprise service usage and enterprise control objective compliance.
-
Video
Reconciling Bring Your Own Device (BYOD) with the Corporate Network
To manage or not to manage—there really is no choice between the two for today’s enterprises. Employees, contractors, partners, and others are bringing in personal devices and connecting to the corporate network for professional and personal reasons.
-
Video
Implementing an Effective Operating Model to Ensure Organisational Alignment to Continuously Improve IAM Services
A fundamental mistake for organisations when handling security needs is performing individual, one-off projects to address IAM concerns. Individual projects often lack centralised leadership and provide only temporary solutions to the issue at hand.
-
Video
Trust but apply ZERO TRUST
Many organizations struggle with digital transformation, hybrid workforces and cloud computing particularly when implementing a framework to meet their compliance requirements.
-
Video
How to implement an IAM Roadmap with Effective Ongoing Demand-Management Practices To Align Business Needs
Organisations often lack mature roadmaps, creating point-in-time roadmaps but not actively managing or working from them over time. (In other cases, organizations lack a roadmap at all.)
-
Video
Analysing the impact of the increased use of SaaS and cloud technologies on data protection
Understanding that Saas, and Privacy and Data Protection Issues with the Adoption of SaaS. Software-as-a-Service (SaaS) is not just a cloud-based delivery model, but also a service that allows organizations to cater to their IT service management needs.
-
Webinar
How to mitigate crypto risks with the right data-driven compliance strategy
Despite increased adoption of cryptocurrency across the world, some financial institutions continue to hold back from banking cryptocurrency businesses and investing resources to capitalize on its opportunities, in part because of the perception that it is impossible to control for illicit activity.
-
Video
GRCTV: UK Surveillance Laws, Whistleblowers and Data Protection
Access this episode on demand, as we delve into UK Surveillance Laws, Whistleblowers and Data Protection.
-
News
Proposed VPN ban in India would hit businesses
An Indian parliament proposal to block virtual private networks (VPNs) will seriously hinder the ability of companies in the country to do business, according to a leading figure in India’s internet sector.