Library – Page 47
-
Video
Ransomware Jail. Is There Any Way Out?
Tired of seeing non-stop ransomware news and trying to understand how it got to this point?
-
Video
Protecting privacy and ensuring data flows
How do companies leverage data flows to conduct everyday operations?
-
Video
Getting to grips with increased data management complexity in a post-Pandemic world
In an age of unprecedented change and complexity, managing data complexity is easier this is easier said than done.
-
Video
Meeting Identity and Access Management Challenges in the Era of Mobile and Cloud
Organisations are flocking to cloud services and mobile devices to cut costs and boost productivity.
-
Video
Outlining Effective Performance metrics provide transaction-level reporting to measure efficiency of services and projects
Many organisations lack defined metrics that report on the status and maturity of an IAM environment, such as enterprise service usage and enterprise control objective compliance.
-
Video
Reconciling Bring Your Own Device (BYOD) with the Corporate Network
To manage or not to manage—there really is no choice between the two for today’s enterprises. Employees, contractors, partners, and others are bringing in personal devices and connecting to the corporate network for professional and personal reasons.
-
Video
Implementing an Effective Operating Model to Ensure Organisational Alignment to Continuously Improve IAM Services
A fundamental mistake for organisations when handling security needs is performing individual, one-off projects to address IAM concerns. Individual projects often lack centralised leadership and provide only temporary solutions to the issue at hand.
-
Video
Trust but apply ZERO TRUST
Many organizations struggle with digital transformation, hybrid workforces and cloud computing particularly when implementing a framework to meet their compliance requirements.
-
Video
How to implement an IAM Roadmap with Effective Ongoing Demand-Management Practices To Align Business Needs
Organisations often lack mature roadmaps, creating point-in-time roadmaps but not actively managing or working from them over time. (In other cases, organizations lack a roadmap at all.)
-
Video
Analysing the impact of the increased use of SaaS and cloud technologies on data protection
Understanding that Saas, and Privacy and Data Protection Issues with the Adoption of SaaS. Software-as-a-Service (SaaS) is not just a cloud-based delivery model, but also a service that allows organizations to cater to their IT service management needs.
-
Webinar
How to mitigate crypto risks with the right data-driven compliance strategy
Despite increased adoption of cryptocurrency across the world, some financial institutions continue to hold back from banking cryptocurrency businesses and investing resources to capitalize on its opportunities, in part because of the perception that it is impossible to control for illicit activity.
-
Video
GRCTV: UK Surveillance Laws, Whistleblowers and Data Protection
Access this episode on demand, as we delve into UK Surveillance Laws, Whistleblowers and Data Protection.
-
Webinar
Superior, smart and simple; how machine learning is welcoming a new era of data loss prevention
It is widely acknowledged that human error is the leading cause of data breaches. Arming your people with smart solutions to prevent security incidents should be a top priority in our new world of remote working.
-
Report
A Report on the Colorado Privacy Act
The Colorado Privacy Act (CPA) was signed into law on 8 July 2021. The CPA is the third comprehensive state privacy law in the U.S., following the California Consumer Privacy Act (CCPA) and Virginia’s Consumer Data Protection Act (CPDA).
-
ebook
The Complete Guide to Business Privacy
Your Organization’s Greatest Responsibility & Opportunity
-
ebook
Managing Security for a Hybrid Workforce
A Guide to Ensuring Email and File Protection Across Platforms
-
ebook
Who Holds the Keys to Your Data?
How to use your preferred cloud provider whilst maintaining data privacy and sovereignty.
-
Webinar
Conquering a CPRA Data Retention Strategy in 60 Days
The California Privacy Rights Act (CPRA) comes into effect on January 1, 2023. Among its new requirements is a new data retention provision.
-
Video
GRCTV: Emerging Financial Crime Threats and How To Combat Them
Access this episode on demand, as we delve into Emerging Financial Crime Threats and How to Combat Them.
-
Podcast
Microsoft Podcast: Manage risk with intelligent data protection and compliance solutions
During this podcast, our subject matter experts will discuss the biggest concerns for today’s CIOs, CISOs and DPOs and they will explore the best ways to protect data, mitigate risk, and address compliance regulations in this new reality.