More from Information Security – Page 13
-
ebookAnjuna: Protect Your Data Even If You Are Breached
Anjuna confidential computing software enables secure enclaves to secure data hardware-level encryption for end-to-end data protection.
-
FeatureManaging Business Risks: Walking the Tightrope to Growth — #RISK
Companies are stepping up investment in IT, digital transformation and cybersecurity even amid warnings of an imminent recession, a recent PwC survey found.
-
FeatureMeet the expert: Riccardo Bua to speak at PrivSec Brussels.
We’re looking forward to welcoming global cybersecurity leader Riccardo Bua to the speakers’ roster at PrivSec Brussels next month.
-
FeatureGoogle’s £35m Australian Fine: Consumer Law Steps In Where Privacy Law Would Fail
Australia’s privacy regime is weak compared to most other major economies. Yet on Friday, an Australian court ordered Google to pay AUD 60 million (£35 million) in fines for its “deceptive” data collection practices.
-
WebinarData Retention: The Blind Spot in your Privacy Programme (Central & Eastern Europe)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Feature‘Indiscriminate Scanning’: EU Authorities Criticise Child Abuse Detection Proposals
The European Data Protection Board (EDPB) and European Data Protection Supervisor (EDPS) have published an opinion about proposed child safety measures that they claim could lead to “indiscriminate scanning of the content of virtually all types of electronic communications of all users”.
-
WebinarExpert Webinar: Supplier Risk Management Best Practices
What best-practice techniques are employed to streamline supplier risk management processes – from vendor onboarding and enhanced due diligence to ongoing monitoring?
-
WebinarDriving Accountability across the Organization with Cyber Risk Governance
Organisations are increasingly looking into setting a uniform standard for their cyber security programs that can sit across the entire structure. However, they first need to determine what standard is appropriate - and find a way to measure performance against it consistently.
-
ReportCharting the UK Data Protection Profession: June 2022 Report
Data Protection World Forum and The DPO Centre are delighted to bring you the eighth Index survey report from the ground-breaking UK Data Protection Index.
-
VideoBest Practices for Detecting, Preventing and Recovering From Ransomware
Ransomware continues to cause huge losses and harms across the globe. But taking a proactive approach to security and business continuity can reduce the likelihood of falling victim to an attack—and reduce the damage that occurs if you are targeted.
-
EventAbout #RISK
Europe’s Leading Risk Focused EXPO – November 16 & 17, ExCeL, London – “Risk is now everyone’s business”.
-
VideoThe Dangers of AI-Driven Mass Surveillance
Artificial intelligence is driving huge improvements in fields as diverse as medicine and climate monitoring. But from biometric identification to “social credit” scoring systems, AI is also providing new ways for governments and large corporations to track and surveil people—with significant implications for their privacy and freedom.
-
VideoCan Privacy Enhancing Technologies (PETs) Solve the Data Transfer Puzzle?
The legal issues around data transfers continue to cause confusion and consume resources. Many believe the solution lies in Privacy Enhancing Technologies (PETs). The US and UK governments are even collaborating on an “innovation prize challenge” to encourage the development of PETs for data transfers.
-
VideoInsider Threats: Detecting and Mitigating the Threat From Within
Insider threats can lead to devastating security incidents—whether intentional or negligent, and perpetrated by a from a trusted employee, ex-employee, or contractor.
-
VideoHow to Manage Third-Party Risk in Your Supply Chain
Supply chain risks take many forms and can be devastating to your organisation if not properly mitigated. From cybersecurity to reputational and legal issues, managing risk among your vendors and other third parties can be a daunting task.
-
VideoSecure SAP Development at the Speed of Digital Transformation
SAP applications are the cornerstone of business operations and have become a top attack vector for enterprises.The need for secure development and testing of applications have never been greater. Yet there is a lack of tools that sufficiently support SAP languages, components, and development environments, resulting in the use of manual code reviews which are error prone.
-
VideoThe ROI of Data Privacy
Turning privacy into a business enabler by raising data privacy awareness and business accountability with key GDPR requirements. Implementing a data privacy programme that will channel data privacy to boost revenue, market reputation & customer trust leading to a meaningful ROI. Video: The ROI of Data Privacy ...
-
VideoRe-Thinking Trusted Data
The explosive growth of data and the value it creates calls on data professionals to level up their programs to build, demonstrate, and maintain trust. The days of fine print, pre-ticked boxes, and data hoarding are gone and strong collaboration from data, privacy, marketing and ethics teams is necessary to design trustworthy data-driven practices.
-
VideoData Retention and Minimisation: Best Practice
Getting data retention and minimisation right is crucial to ensuring effective data protection compliance. Only collecting the data you need, and only storing it for as long as required, significantly reduces the likelihood of a data breach or other violation.
-
VideoBuilding a Privacy Management Program
A privacy management programme must be well-informed, accesible, and dynamic enough to adapt to fast-changing requirements.


