Library – Page 49
-
Video
GRCTV: Risk Quantification and Surveillance Advertising
Access the on-demand videos below from GRC TV - risk quantification & surveillance advertising
-
Webinar
Where are you on the Data Provisioning Maturity Model?
The data provisioning maturity model acts as both a measuring stick and common framework for organizations to help illustrate what is needed to understand and ultimately improve their data protection program.
-
Webinar
Instant payments need instant screening
Everyday millions, if not billions, of transactions flow through the financial system. At the same time the consumer and commercial demand for instant payments is increasing, shrinking the transaction processing window.
-
Research
Charting the UK Data Protection Profession: June 2021 Report
Data Protection World Forum and The DPO Centre are delighted to bring you the fourth Index survey report from the ground-breaking UK Data Protection Index.
-
Webinar
Private Healthcare: Why do you need intelligent email security?
Email is a vital communication tool for organisations globally. But email is the top security risk for healthcare providers as employees accidentally leak data everyday.
-
-
Webinar
What have we learned about Data Retention 3 years on from the GDPR?
The truth is many companies addressed their data retention obligations during the period of GDPR-readiness and have not circled back since.
-
ebook
OneTrust GRC: Steering Your IT Risk Management Program
Cybersecurity in line with IT risk management is important for both your internal and external GRC execution. Forrester, a world-wide research and advisory firm, recently surveyed CEO’s to produce a new report, The Biggest Trends Shaping Enterprise Risk Management.
-
Webinar
OneTrust GRC: Building a GRC Program That Fits Your Business | A First Line Friendly ISMS Suite
How much time do you spend transferring data across systems to execute your GRC program? Oftentimes, disparate systems across policy, privacy, IT risk, vendor risk, incident, and audit result in duplicated data across applications.
-
Webinar
Data Retention: The Achilles Heel of Global Privacy
Consumers around the world are demanding more protection for their personal information. Data breaches are daily occurrences, and the scope of privacy has widened to include how your organization limits the risk of improper use or exposure of personal data.
-
Webinar
GRC in 2021 - Demonstrate Value Fast with your Program
Today’s distributed, dynamic, and disrupted business has to navigate the velocity of risks which demands agility, resilience, and integrity.
-
Video
GRCTV: The Future Of Warfare & Cyber Threats
Access the on-demand videos below for GRC TV - The Future Of Warfare & Cyber Threats
-
Video
GRCTV - Privacy and data protection
Access the on-demand videos below from GRC TV privacy and data protection.
-
Video
What Do The New Standard Contractual Clauses (SCCs) Mean for Data Transfers Post-Schrems II?
The European Commission has adopted a newly updated version of the Standard Contractual Clauses (SCCs), which are the most commonly used legal mechanisms for transferring personal data and international companies rely upon this hugely.
-
Video
A Celebrity’s Desire for a Privacy Framework
We may envy their bank accounts, their houses, their cars and their lifestyle, but a celebrity almost signs a contract of constant availability and lack of privacy as their fame rises.
-
Video
A Fireside Chat with Johnny Ryan
Johnny Ryan, Author, Senior Fellow at Irish Council for Civil Liberties, and Open Markets Institute. Self proclaimed sufferer of “adtech remorse”.
-
Video
Where Does a CISO’s Role Go From Here?
Sudden digital transformation has put the role of the CISO in the spotlight with many in the cybersecurity industry suggesting that the title has become overused. Others may associate the role of the CISO as being innovation or cloud averse.
-
Video
Politics, Economics, Social: Russia’s State-Led Cyber Espionage and Influence Operations
Whether it be the SolarWinds attack, the 2016 US election interference, or a number of other cyber operations over the past few years, there’s a growing perception/reality that Russia is increasingly flexing its cyber muscles internationally, using the lessons its learned through years of focused cyber-attacks and influence operations in Ukraine and other regional adversaries.
-
Video
Confidential Computing: The Next, Great, Development in Data Protection
A recent IBM IBV study said 74% of CEOs think adoption of cloud will be critical for their businesses in the next two to three years.
-
Video
Third Party Risk Management: Regulatory Developments and the Impact on Vendor Risk Management (VRM)
Covid-19 has led to Enterprise organizations increasing their focus on Third Party Risk Management. But global regulatory developments have also had an effect upon companies challenges to do enough due-diligence to identify vendor risks.