Library – Page 67
-
Webinar
A Necessary Change in the Data Protection Mindset
It is time for a paradigm shift in security.
-
Webinar
Defining Privacy Success and the struggle to measure it
Most companies are years into their privacy programs, but still haven’t figured out part of the essentials: how to accurately measure the success and impact of the privacy team’s work.
-
Webinar
Defensible Data Retention: The Holy Grail of Mitigating Data Privacy Risks
Over-retention of data is a major data privacy risk. US and international regulations specifically require that companies ensure their retention standards are up-to-date and enforced, and that all obsolete records containing regulated sensitive data are disposed of promptly.
-
Webinar
Building an Insider Threat Program for your Organization
Cybersecurity measures are often focused on threats from outside an organization rather than threats posed by individuals inside an organization.
-
Webinar
Scaling Data Governance in Line with Business Growth
Strong data governance involves getting the right people, processes and technologies in place that are needed to manage and protect the organisations data assets. It forms the basis for effective Legal GRC practices and makes the efficient use of trustworthy data possible.
-
-
Webinar
The Glass House: anonymity and data exposure in an AI world
All organizations live in a Glass House. From ISP’s to content delivery networks to website advertising, all commercial internet activity is being tracked, collected and monetized by a highly-automated data broker marketplace.
-
Webinar
Navigating Global Privacy Laws Along the IT Asset Lifecycle
As if cyberthreats weren’t enough, consumer privacy laws have put increased pressure on IT leaders to keep personal or sensitive data from being breached. This includes mandates to immediately and thoroughly respond to data deletion requests, data retention expirations, and other cases of no-longer-needed data across your entire data ...
-
Webinar
The Balancing Act: Productivity, Collaboration and Data Protection
Join Microsoft for a deep dive on how you can use intelligent and built-in solutions to identify, label and protect sensitive data without impeding collaboration, even in an environment of remote work. We will follow the journey of an organization as individual workers collaborate on a patent pending project ...
-
Webinar
Safely Unleash the Value of Sensitive Data in the Cloud
Organizations are leveraging the Cloud to maximise the value of data, consolidating it in data lakes and committing to analytics and machine learning initiatives to convert it into actionable insights. As analysts and data scientists have started working with these tools it has become clear that to provide accurate ...
-
ebook
Annulment of Privacy Shield – What Comes Next?
In striking down Privacy Shield, EU judges instantly threw into doubt the operations of more than 5,000 US companies that relied on it.
-
ebook
How Businesses Can Meet CCPA Compliance Requirements
The California Consumer Privacy Act (CCPA) is a California state statute intended to enhance California residents’ privacy rights.
-
Webinar
The Legal GRC Landscape Today, and Tomorrow
According to Exterro’s recent 2020 Corporate Legal Leaders Survey, 7-in-10 Legal Departments are managing their data related problems by sharing technology to manage litigation, data privacy, compliance, and cybersecurity – all of which represent a new encompassing business landscape of Legal GRC (Governance, Risk and Compliance).
-
Webinar
How to align infosec, data governance and employees to deliver stronger data governance and security
Getting a grip on unstructured data causes headaches because it’s so hard to get visibility of - and you simply can’t secure what you don’t know you’ve got.
-
ebook
Mid-Year CCPA Trends Report 2020
Now that the July 1st enforcement date for the California Consumer Privacy Act (CCPA) has come and gone, the question on every business’s mind is, “How many Data Subject Requests (DSRs) should I expect to receive?”
-
Webinar
A New and Critical Approach To Protecting Your Data
Most cybersecurity protections are based on looking for, finding, and stopping threats.
-
-
Webinar
How to Make Privacy Training Stick
Privacy training shouldn’t be doomed to guesswork and low engagement.
-
Webinar
Data Privacy by Design for the Insurance Sector
Insurance is a heavily regulated sector that deals with large amounts of sensitive customer information as a core component of the business.
-
Webinar
Coping with Turbulence: Managing Cross-Border Data Transfers
There’s now more pressure than ever for managing data flows across jurisdictions, governing third party data sharing and enforcing data residency requirements.