Library – Page 46
-
Video
Building an effective security strategy for privacy
Information, data privacy and security concerns are a persistent trend and central to all too many political and ethical scandals, data privacy has become one of the defining social and cultural issues today.
-
Video
Data lifecycle management challenges
One of the main challenges faced by companies involves adequately managing the information at hand, which is essential when making the right decisions.
-
Video
Shaping the Future of Data Privacy Globally
A look at compliance challenges faced by globally-data driven businesses relying on international data transfers.
-
Video
Data Management and Protection as a Service (DPaaS) to improve business continuity within your organisation
According to a report published by Transparency Market Research, the market for Data Protection as a Service (DPaaS) is expected to reach $46 billion by 2024.
-
Video
Getting to grips with the very real threat of modern ransomware and its impact on organisations
Infrastructure and operations leaders responsible for data protection must evaluate new ransomware protection features as critical prerequisites when choosing backup platforms.
-
Video
Ransomware Jail. Is There Any Way Out?
Tired of seeing non-stop ransomware news and trying to understand how it got to this point?
-
Video
Protecting privacy and ensuring data flows
How do companies leverage data flows to conduct everyday operations?
-
Video
Getting to grips with increased data management complexity in a post-Pandemic world
In an age of unprecedented change and complexity, managing data complexity is easier this is easier said than done.
-
Video
Meeting Identity and Access Management Challenges in the Era of Mobile and Cloud
Organisations are flocking to cloud services and mobile devices to cut costs and boost productivity.
-
Video
Outlining Effective Performance metrics provide transaction-level reporting to measure efficiency of services and projects
Many organisations lack defined metrics that report on the status and maturity of an IAM environment, such as enterprise service usage and enterprise control objective compliance.
-
Video
Reconciling Bring Your Own Device (BYOD) with the Corporate Network
To manage or not to manage—there really is no choice between the two for today’s enterprises. Employees, contractors, partners, and others are bringing in personal devices and connecting to the corporate network for professional and personal reasons.
-
Video
Implementing an Effective Operating Model to Ensure Organisational Alignment to Continuously Improve IAM Services
A fundamental mistake for organisations when handling security needs is performing individual, one-off projects to address IAM concerns. Individual projects often lack centralised leadership and provide only temporary solutions to the issue at hand.
-
Video
Trust but apply ZERO TRUST
Many organizations struggle with digital transformation, hybrid workforces and cloud computing particularly when implementing a framework to meet their compliance requirements.
-
Video
How to implement an IAM Roadmap with Effective Ongoing Demand-Management Practices To Align Business Needs
Organisations often lack mature roadmaps, creating point-in-time roadmaps but not actively managing or working from them over time. (In other cases, organizations lack a roadmap at all.)
-
Video
Analysing the impact of the increased use of SaaS and cloud technologies on data protection
Understanding that Saas, and Privacy and Data Protection Issues with the Adoption of SaaS. Software-as-a-Service (SaaS) is not just a cloud-based delivery model, but also a service that allows organizations to cater to their IT service management needs.
-
Webinar
How to mitigate crypto risks with the right data-driven compliance strategy
Despite increased adoption of cryptocurrency across the world, some financial institutions continue to hold back from banking cryptocurrency businesses and investing resources to capitalize on its opportunities, in part because of the perception that it is impossible to control for illicit activity.
-
Video
GRCTV: UK Surveillance Laws, Whistleblowers and Data Protection
Access this episode on demand, as we delve into UK Surveillance Laws, Whistleblowers and Data Protection.
-
Webinar
Superior, smart and simple; how machine learning is welcoming a new era of data loss prevention
It is widely acknowledged that human error is the leading cause of data breaches. Arming your people with smart solutions to prevent security incidents should be a top priority in our new world of remote working.
-
ebook
The Complete Guide to Business Privacy
Your Organization’s Greatest Responsibility & Opportunity
-
ebook
Managing Security for a Hybrid Workforce
A Guide to Ensuring Email and File Protection Across Platforms