Library – Page 65
-
Video
Financial Data and the Ethical Issues of Technical Innovation
Financials services is one of the most innovative sectors in they way organisations source and use information and this creates multiple challenges for data protection professionals - this panel discusses the practical issues in creating an ethical strategy.
-
Video
Embedding Security and Risk Management into Your Organisation
Cyber security plays a critical role in helping digital businesses to flourish.
-
Video
Best practice advice on data sharing requests policy
The regulatory regimes across the Middle East and North Africa are going through a stage of rapid development and alignment, creating challenges for companies doing business across the region.
-
Video
Why It’s Time to Rethink Your Approach to Data Classification
How can enterprises know their data in a fragmented data landscape of diverse data formats, schemas, content, and metadata types? Why haven’t we solved the classification conundrum - and how can security and privacy teams lead the charge for next-generation classification?
-
Video
The Zero Trust Model - Securing Your Sensitive Data
Speaker Panel The Zero Trust Model - Securing Your Sensitive Data Video: The Zero Trust Model - Securing You…
-
Video
Data Discovery: What Skeletons are Hiding in Your Unstructured Data?
With the ever-increasing use of data and number of digital threats to organisations, data breaches are unfortunately commonplace.
-
Video
What Does a Successful Data Access Governance Programme Look Like?
Strong walls only get you so far – the nature of a best practice approach to data access governance is to increase the focus on how data is controlled internally.
-
Video
Data Discovery: What Skeletons are Hiding in Your Unstructured Data
Unstructured data is a compliance risk. Examples of this type of data can include the content of email messages and spreadsheets through to business plans and intellectual property.
-
Video
Business resilience and continuity in a time of uncertainty
Business continuity planning allows organisations to respond, resume and restore operations in the event of disruptions.
-
Video
Jeff Lanza on Cybercrime: Strategies to Prevent, Protect and Prevail
From computer intrusions to ransomware, a 20-year veteran FBI special agent and cyber security expert traces the evolution of the cybercrime “pandemic” and provides countermeasures to combat the global threat.
-
Video
Engaging the board: How your board can be ready for crisis
Engaging the board is an ongoing challenge in cyber security for a variety of reasons: what seems like a uniquely technical issue is actually a complex business risk present across different business functions.
-
Video
Best Practice for Incident Response
Effective incident response is a key component of being able to contain and respond to a breach.
-
Video
The road to operationalizing security and privacy visibility and controls
KeyBank’s compliance transformation: The road to operationalizing security and privacy visibility and controls
-
Video
Investing in Your People: The Value of Security Awareness and Engagement
The best way to secure your network and keep your data safe is to invest in your employees.
-
Video
Building Your Security Dream Team
How can you guarantee that your security team has the right skills and resources to implement your cyber security plan?
-
Video
Implementing a Robust Data Protection Program
Building and maintaining strong data protection strategies faces specific challenges for organisations working in the Middle East and North Africa region.
-
Video
How Diversity Can Enable Organisations to Combat Security Risks
A diverse cybersecurity team is critical to generating ideas and processes needed to confront security risks.
-
Video
The Biggest Challenges for Indian Data Protection Professionals in 2021
From the coronavirus pandemic to changing regulation in the region, India faces special challenges over the coming year.
-
Video
The Evolving Security Landscape - Trends to Expect in 2021 and Beyond
What is the current state of cybercrime and what are the common types of incidents being reported?
-
Webinar
Acting on Brexit and Schrems II
There are 2 things on the minds of European privacy pros that have nothing to do with the pandemic: Brexit and Schrems II.