Library – Page 48
-
Webinar
Tackling the Expanding ‘Shadow IT’ Environment
The ever-growing extension of the official IT environment is one of the biggest challenges for digital forensics practitioners today.
-
Video
The GRC Red Flag Series: Operational Resiliency and the Future of Risk & Resiliency Management
Access the on-demand video for The GRC Red Flag Series: Operational Resiliency and the Future of Risk & Resiliency Management
-
Webinar
Data Acceleration in the Era of Accelerated Cloud Transformation and Remote Work
Based on the findings from 2021 Thales European Data Threat Report, the global pandemic has had a significant impact on data security with accelerated cloud migration and increased remote working.
-
Video
GRCTV: Risk Quantification and Surveillance Advertising
Access the on-demand videos below from GRC TV - risk quantification & surveillance advertising
-
Webinar
Where are you on the Data Provisioning Maturity Model?
The data provisioning maturity model acts as both a measuring stick and common framework for organizations to help illustrate what is needed to understand and ultimately improve their data protection program.
-
Webinar
Instant payments need instant screening
Everyday millions, if not billions, of transactions flow through the financial system. At the same time the consumer and commercial demand for instant payments is increasing, shrinking the transaction processing window.
-
Webinar
Private Healthcare: Why do you need intelligent email security?
Email is a vital communication tool for organisations globally. But email is the top security risk for healthcare providers as employees accidentally leak data everyday.
-
-
Webinar
What have we learned about Data Retention 3 years on from the GDPR?
The truth is many companies addressed their data retention obligations during the period of GDPR-readiness and have not circled back since.
-
ebook
OneTrust GRC: Steering Your IT Risk Management Program
Cybersecurity in line with IT risk management is important for both your internal and external GRC execution. Forrester, a world-wide research and advisory firm, recently surveyed CEO’s to produce a new report, The Biggest Trends Shaping Enterprise Risk Management.
-
Webinar
OneTrust GRC: Building a GRC Program That Fits Your Business | A First Line Friendly ISMS Suite
How much time do you spend transferring data across systems to execute your GRC program? Oftentimes, disparate systems across policy, privacy, IT risk, vendor risk, incident, and audit result in duplicated data across applications.
-
Webinar
Data Retention: The Achilles Heel of Global Privacy
Consumers around the world are demanding more protection for their personal information. Data breaches are daily occurrences, and the scope of privacy has widened to include how your organization limits the risk of improper use or exposure of personal data.
-
Webinar
GRC in 2021 - Demonstrate Value Fast with your Program
Today’s distributed, dynamic, and disrupted business has to navigate the velocity of risks which demands agility, resilience, and integrity.
-
Video
GRCTV: The Future Of Warfare & Cyber Threats
Access the on-demand videos below for GRC TV - The Future Of Warfare & Cyber Threats
-
Video
GRCTV - Privacy and data protection
Access the on-demand videos below from GRC TV privacy and data protection.
-
Video
What Do The New Standard Contractual Clauses (SCCs) Mean for Data Transfers Post-Schrems II?
The European Commission has adopted a newly updated version of the Standard Contractual Clauses (SCCs), which are the most commonly used legal mechanisms for transferring personal data and international companies rely upon this hugely.
-
Video
A Celebrity’s Desire for a Privacy Framework
We may envy their bank accounts, their houses, their cars and their lifestyle, but a celebrity almost signs a contract of constant availability and lack of privacy as their fame rises.
-
Video
A Fireside Chat with Johnny Ryan
Johnny Ryan, Author, Senior Fellow at Irish Council for Civil Liberties, and Open Markets Institute. Self proclaimed sufferer of “adtech remorse”.
-
Video
Where Does a CISO’s Role Go From Here?
Sudden digital transformation has put the role of the CISO in the spotlight with many in the cybersecurity industry suggesting that the title has become overused. Others may associate the role of the CISO as being innovation or cloud averse.
-
Video
Politics, Economics, Social: Russia’s State-Led Cyber Espionage and Influence Operations
Whether it be the SolarWinds attack, the 2016 US election interference, or a number of other cyber operations over the past few years, there’s a growing perception/reality that Russia is increasingly flexing its cyber muscles internationally, using the lessons its learned through years of focused cyber-attacks and influence operations in Ukraine and other regional adversaries.