Library – Page 68
-
Video
Microsoft Executive Q&A On Compliance and Risk Management
Join this executive Q&A by Microsoft where they will discuss compliance and risk management.
-
Report
The land of the free: combatting financial crime in the US
So we now know that we will have a new US President. FinCrime Report looks at the key issues for anti-money laundering regulation stateside ahead of the Joe Biden era.
-
Report
California’s Proposition 24 has been passed by voters
“Proposition 24” has been passed by voters, with 56.1% of the 10.5m votes in California cast in favour and with it, new privacy protections will come into law. PrivSec Report takes a look at some of the reactions to the Act’s provisions and finds out why some in the privacy world are not huge fans.
-
ebook
Four Technologies Combine To Protect You From Ransomware Attacks
As the ones responsible for recovering from outages, infrastructure and operations (I&O) pros have successfully managed recoveries from all failures but one: ransomware.
-
ebook
Tackling Data Security and Compliance Challenges
Three questions every CIO should ask about their data storage security.
-
Webinar
Crafting a solution to Schrems II: Is a permanent fix possible?
On July 16, the EU’s highest court once again delivered a bombshell data protection ruling by annulling the EU-US Privacy Shield.
-
ebook
Company-issued Computers: What are employees really doing with them?
Now more than ever, organizations are issuing computing devices – laptops, mobile phones, desktops – en masse to their staff. There was no choice, as in March a certain submicroscopic infectious agent arrived uninvited to obliterate 2020.
-
ebook
Ransomware Protection Buyer’s Guide
Ransomware impacts both big and small organizations across every industry.
-
Webinar
The Schrems II Decision: What it Means for Privacy Programs
On 16 July, the Court of Justice of the European Union released its much-anticipated decision in the Schrems II case, invalidating the US-EU Privacy Shield and providing clarity around Standard Contractual Clauses (SCCs).
-
Webinar
A Necessary Change in the Data Protection Mindset
It is time for a paradigm shift in security.
-
Report
Identifying, verifying and authenticating customers in banking
GRC World Forums looks at some of the identification and verification technologies currently being used to ensure privacy and security in an increasingly complex banking landscape while ensuring user experience remains positive.
-
Webinar
Defining Privacy Success and the struggle to measure it
Most companies are years into their privacy programs, but still haven’t figured out part of the essentials: how to accurately measure the success and impact of the privacy team’s work.
-
Webinar
Defensible Data Retention: The Holy Grail of Mitigating Data Privacy Risks
Over-retention of data is a major data privacy risk. US and international regulations specifically require that companies ensure their retention standards are up-to-date and enforced, and that all obsolete records containing regulated sensitive data are disposed of promptly.
-
Webinar
Building an Insider Threat Program for your Organization
Cybersecurity measures are often focused on threats from outside an organization rather than threats posed by individuals inside an organization.
-
Webinar
Scaling Data Governance in Line with Business Growth
Strong data governance involves getting the right people, processes and technologies in place that are needed to manage and protect the organisations data assets. It forms the basis for effective Legal GRC practices and makes the efficient use of trustworthy data possible.
-
-
Webinar
The Glass House: anonymity and data exposure in an AI world
All organizations live in a Glass House. From ISP’s to content delivery networks to website advertising, all commercial internet activity is being tracked, collected and monetized by a highly-automated data broker marketplace.
-
Webinar
Navigating Global Privacy Laws Along the IT Asset Lifecycle
As if cyberthreats weren’t enough, consumer privacy laws have put increased pressure on IT leaders to keep personal or sensitive data from being breached. This includes mandates to immediately and thoroughly respond to data deletion requests, data retention expirations, and other cases of no-longer-needed data across your entire data ...
-
Webinar
The Balancing Act: Productivity, Collaboration and Data Protection
Join Microsoft for a deep dive on how you can use intelligent and built-in solutions to identify, label and protect sensitive data without impeding collaboration, even in an environment of remote work. We will follow the journey of an organization as individual workers collaborate on a patent pending project ...
-
Webinar
Safely Unleash the Value of Sensitive Data in the Cloud
Organizations are leveraging the Cloud to maximise the value of data, consolidating it in data lakes and committing to analytics and machine learning initiatives to convert it into actionable insights. As analysts and data scientists have started working with these tools it has become clear that to provide accurate ...