Library – Page 66
-
ebook
Rethinking Data Protection: The Human-centric Approach
The truth about traditional data security. Traditional cybersecurity was hinged on event-centric responses: Build a wall at the perimeter, control what passes in and out through that wall, and respond when something suspicious happens.
-
Video
Tackling Local and Global Regulations with Microsoft Compliance
Join this session with Microsoft where they will discuss Tackling Local and Global Regulations with Microsoft Compliance.
-
Video
Protect sensitive data in Microsoft Teams with Microsoft DLP
Join this session with Microsoft where they will discuss protecting sensitive data in Microsoft Teams with Microsoft DLP.
-
Webinar
Privacy in the Boardroom: The Metrics, KPIs and Reporting You Need
Stakeholder support for a privacy program is key, especially as compliance programs grow and organizations focus their attention on an increasing number of regulations and frameworks from around the world.
-
Webinar
Data Retention & Minimisation: Lessons Learned in 2020
Data retention and minimisation played a key role in numerous cases and enforcement actions throughout 2020. Worryingly, the range of infractions varied widely, teaching us that it is certainly an area that is very challenging for organisations to address.
-
ebook
Privacy Management Solution Buyer’s Guide
A privacy solution is the backbone of a solid privacy program, and choosing the right one for your particular business can be confusing and overwhelming at times.
-
Webinar
How to Successfully Manage Ungoverned Data for Risk Mitigation
Enterprises are collecting and managing more data than ever to create value, making every company a “data” company. But for data to provide value, organizations need to know where it is, who has access to it, how it’s managed, and how it needs to be secured and protected.
-
ebook
Nine reasons why security leaders need to re-evaluate email security
In September 2020 Gartner released an update of its Market Guide for Email Security.
-
Webinar
Overcoming Data Privacy’s Biggest Challenge: Data Retention
Addressing data retention is the surest way to mitigate risks and costs of a data breach.
-
Webinar
Many Ways to Defeat Multi-Factor Authentication
Everyone knows that multi-factor authentication (MFA) is more secure than a simple login name and password, but too many people think that MFA is a perfect, unhackable solution. It isn’t!
-
Webinar
Cyber Security: Employee Awareness in the New Normal
Phishing attacks are often seen as the most damaging and most common threat facing businesses. More people are now working from home and for many, this has the new normal – as a result employees have an increased risk of being targeted.
-
Webinar
What ROI to expect from better consent & preference management?
In this session, you will discover different use cases of consent and preference management in retail, both physical and digital.
-
Webinar
How to Find Your Biggest Governance, Security, and Privacy Risks
Over the last decade, data has become the driving force behind businesses, economies, and daily life.
-
Video
Microsoft Executive Q&A On Compliance and Risk Management
Join this executive Q&A by Microsoft where they will discuss compliance and risk management.
-
ebook
Four Technologies Combine To Protect You From Ransomware Attacks
As the ones responsible for recovering from outages, infrastructure and operations (I&O) pros have successfully managed recoveries from all failures but one: ransomware.
-
ebook
Tackling Data Security and Compliance Challenges
Three questions every CIO should ask about their data storage security.
-
Webinar
Crafting a solution to Schrems II: Is a permanent fix possible?
On July 16, the EU’s highest court once again delivered a bombshell data protection ruling by annulling the EU-US Privacy Shield.
-
ebook
Company-issued Computers: What are employees really doing with them?
Now more than ever, organizations are issuing computing devices – laptops, mobile phones, desktops – en masse to their staff. There was no choice, as in March a certain submicroscopic infectious agent arrived uninvited to obliterate 2020.
-
ebook
Ransomware Protection Buyer’s Guide
Ransomware impacts both big and small organizations across every industry.
-
Webinar
The Schrems II Decision: What it Means for Privacy Programs
On 16 July, the Court of Justice of the European Union released its much-anticipated decision in the Schrems II case, invalidating the US-EU Privacy Shield and providing clarity around Standard Contractual Clauses (SCCs).