Library – Page 69
-
ebook
Annulment of Privacy Shield – What Comes Next?
In striking down Privacy Shield, EU judges instantly threw into doubt the operations of more than 5,000 US companies that relied on it.
-
ebook
How Businesses Can Meet CCPA Compliance Requirements
The California Consumer Privacy Act (CCPA) is a California state statute intended to enhance California residents’ privacy rights.
-
Webinar
The Legal GRC Landscape Today, and Tomorrow
According to Exterro’s recent 2020 Corporate Legal Leaders Survey, 7-in-10 Legal Departments are managing their data related problems by sharing technology to manage litigation, data privacy, compliance, and cybersecurity – all of which represent a new encompassing business landscape of Legal GRC (Governance, Risk and Compliance).
-
Webinar
How to align infosec, data governance and employees to deliver stronger data governance and security
Getting a grip on unstructured data causes headaches because it’s so hard to get visibility of - and you simply can’t secure what you don’t know you’ve got.
-
ebook
Mid-Year CCPA Trends Report 2020
Now that the July 1st enforcement date for the California Consumer Privacy Act (CCPA) has come and gone, the question on every business’s mind is, “How many Data Subject Requests (DSRs) should I expect to receive?”
-
Webinar
A New and Critical Approach To Protecting Your Data
Most cybersecurity protections are based on looking for, finding, and stopping threats.
-
-
Webinar
How to Make Privacy Training Stick
Privacy training shouldn’t be doomed to guesswork and low engagement.
-
Webinar
Data Privacy by Design for the Insurance Sector
Insurance is a heavily regulated sector that deals with large amounts of sensitive customer information as a core component of the business.
-
Webinar
Coping with Turbulence: Managing Cross-Border Data Transfers
There’s now more pressure than ever for managing data flows across jurisdictions, governing third party data sharing and enforcing data residency requirements.
-
ebook
Ransomware Protection with Pure Storage and Commvault
Ransomware attacks continue to be top of mind for business and IT leaders. And for good reason.
-
ebook
Discovery-In-Depth, The Path to Data Intelligence
Privacy-centric data discovery (a must for data privacy and cybersecurity in today’s environment) requires a multi-pronged strategy to identify all types of sensitive & personal data in an organization – and that strategy starts with discovery-in-depth.
-
ebook
The Six Foundations of Data Privacy Regulation
The six most commonly discussed data protection regulations are the European Union’s GDPR, the California Consumer Privacy Act (CCPA) and Health Insurance Portability and Accountability Act (HIPAA) in the United States, Brazil’s LGPD, Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA) and the Australian Data Privacy Law.
-
ebook
The Habits of Highly Data-Secure Companies
New IDG survey reveals three technologies that are helping enterprises build immunity to data breaches, in and out of the cloud.
-
ebook
The State of Email Security 2020
Global business is interspersed with a diversity of industrial sectors, united by a single, common communication thread that is key to any business: email connectivity.
-
ebook
The Practical Executive’s Guide To Data Loss Prevention
There has been much confusion in the marketplace regarding data loss prevention (DLP) controls.
-
Webinar
Successfully Managing Data Processors to Comply with GDPR
There are several considerations that need addressing beforeyou decide which data processors offer the most appropriate services for yourorganisation’s needs.
-
Webinar
Cyber AI: Supporting Privacy-First Security & Data Compliance
Data privacy is critical in increasingly digitized business environments, where the workforce is dispersed and dynamic, and relies on collaboration platforms, smart devices, and cloud computing.
-
Webinar
Solving Your Number One Security Risk
Email has played a growing role in digital transformation during the COVID-19 pandemic, as organisations continue to support large-scale remote working. But it has also introduced risk of accidental and intentional data leakage.
-
Webinar
Prevent Costly Breaches in a Safe and Compliant Way
With so many communications exchanged daily, it’s not a question of whether a mistake will occur, but how often.