More from Information Security – Page 13

  • Anjuna - screenshot
    ebook

    Anjuna: Protect Your Data Even If You Are Breached

    2022-08-22T16:48:00Z

    Anjuna confidential computing software enables secure enclaves to secure data hardware-level encryption for end-to-end data protection. 

  • #RISK register to attend speaker hero
    Feature

    Managing Business Risks: Walking the Tightrope to Growth — #RISK

    2022-08-22T13:30:00Z

    Companies are stepping up investment in IT, digital transformation and cybersecurity even amid warnings of an imminent recession, a recent PwC survey found.

  • Riccardo Bua headshot cropped
    Feature

    Meet the expert: Riccardo Bua to speak at PrivSec Brussels.

    2022-08-19T13:32:00Z

    We’re looking forward to welcoming global cybersecurity leader Riccardo Bua to the speakers’ roster at PrivSec Brussels next month. 

  • digital-security-5553387_1280
    Feature

    Google’s £35m Australian Fine: Consumer Law Steps In Where Privacy Law Would Fail

    2022-08-16T10:38:00Z

    Australia’s privacy regime is weak compared to most other major economies. Yet on Friday, an Australian court ordered Google to pay AUD 60 million (£35 million) in fines for its “deceptive” data collection practices.

  • Webinar graphics 2022 (3) (1)
    Webinar

    Data Retention: The Blind Spot in your Privacy Programme (Central & Eastern Europe)

    2022-08-09T15:43:00Z

    The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.

  • ‘Indiscriminate Scanning’- EU Authorities Criticise Child Abuse Detection Proposals
    Feature

    ‘Indiscriminate Scanning’: EU Authorities Criticise Child Abuse Detection Proposals

    2022-08-05T15:06:00Z

    The European Data Protection Board (EDPB) and European Data Protection Supervisor (EDPS) have published an opinion about proposed child safety measures that they claim could lead to “indiscriminate scanning of the content of virtually all types of electronic communications of all users”.

  • Expert Webinar: Supplier Risk Management Best Practices
    Webinar

    Expert Webinar: Supplier Risk Management Best Practices

    2022-07-19T08:45:00Z

    What best-practice techniques are employed to streamline supplier risk management processes – from vendor onboarding and enhanced due diligence to ongoing monitoring?

  • Driving Accountability across the Organization with Cyber Risk Governance
    Webinar

    Driving Accountability across the Organization with Cyber Risk Governance

    2022-07-14T11:57:00Z

    Organisations are increasingly looking into setting a uniform standard for their cyber security programs that can sit across the entire structure. However, they first need to determine what standard is appropriate - and find a way to measure performance against it consistently.

  • DP INDEX June 2022 Report
    Report

    Charting the UK Data Protection Profession: June 2022 Report

    2022-07-11T13:08:00Z

    Data Protection World Forum and The DPO Centre are delighted to bring you the eighth Index survey report from the ground-breaking UK Data Protection Index.

  • Best Practices for Detecting, Preventing and Recovering From Ransomware
    Video

    Best Practices for Detecting, Preventing and Recovering From Ransomware

    2022-07-05T16:11:00Z

    Ransomware continues to cause huge losses and harms across the globe. But taking a proactive approach to security and business continuity can reduce the likelihood of falling victim to an attack—and reduce the damage that occurs if you are targeted. 

  • #RISK
    Event

    About #RISK

    2022-07-05T16:10:00Z

    Europe’s Leading Risk Focused EXPO – November 16 & 17, ExCeL, London – “Risk is now everyone’s business”.

  • The Dangers of AI-Driven Mass Surveillance
    Video

    The Dangers of AI-Driven Mass Surveillance

    2022-07-05T16:00:00Z

    Artificial intelligence is driving huge improvements in fields as diverse as medicine and climate monitoring. But from biometric identification to “social credit” scoring systems, AI is also providing new ways for governments and large corporations to track and surveil people—with significant implications for their privacy and freedom. 

  • Can Privacy Enhancing Technologies (PETs) Solve the Data Transfer Puzzle?
    Video

    Can Privacy Enhancing Technologies (PETs) Solve the Data Transfer Puzzle?

    2022-07-05T15:07:00Z

    The legal issues around data transfers continue to cause confusion and consume resources. Many believe the solution lies in Privacy Enhancing Technologies (PETs). The US and UK governments are even collaborating on an “innovation prize challenge” to encourage the development of PETs for data transfers.

  • Insider Threats- Detecting and Mitigating the Threat From Within
    Video

    Insider Threats: Detecting and Mitigating the Threat From Within

    2022-07-05T15:01:00Z

    Insider threats can lead to devastating security incidents—whether intentional or negligent, and perpetrated by a from a trusted employee, ex-employee, or contractor.

  • How to Manage Third-Party Risk in Your Supply Chain
    Video

    How to Manage Third-Party Risk in Your Supply Chain

    2022-07-05T14:57:00Z

    Supply chain risks take many forms and can be devastating to your organisation if not properly mitigated. From cybersecurity to reputational and legal issues, managing risk among your vendors and other third parties can be a daunting task.

  • Secure SAP Development at the Speed of Digital Transformation
    Video

    Secure SAP Development at the Speed of Digital Transformation

    2022-07-05T14:53:00Z

    SAP applications are the cornerstone of business operations and have become a top attack vector for enterprises.The need for secure development and testing of applications have never been greater. Yet there is a lack of tools that sufficiently support SAP languages, components, and development environments, resulting in the use of manual code reviews which are error prone.

  • The ROI of Data Privacy
    Video

    The ROI of Data Privacy

    2022-07-05T14:10:00Z

    Turning privacy into a business enabler by raising data privacy awareness and business accountability with key GDPR requirements. Implementing a data privacy programme that will channel data privacy to boost revenue, market reputation & customer trust leading to a meaningful ROI. Video: The ROI of Data Privacy ...

  • Re-Thinking Trusted Data
    Video

    Re-Thinking Trusted Data

    2022-07-05T14:08:00Z

    The explosive growth of data and the value it creates calls on data professionals to level up their programs to build, demonstrate, and maintain trust. The days of fine print, pre-ticked boxes, and data hoarding are gone and strong collaboration from data, privacy, marketing and ethics teams is necessary to design trustworthy data-driven practices.

  • Data Retention and Minimisation- Best Practice
    Video

    Data Retention and Minimisation: Best Practice

    2022-07-05T14:06:00Z

    Getting data retention and minimisation right is crucial to ensuring effective data protection compliance. Only collecting the data you need, and only storing it for as long as required, significantly reduces the likelihood of a data breach or other violation.

  • Building a Privacy Management Program
    Video

    Building a Privacy Management Program

    2022-07-05T14:01:00Z

    A privacy management programme must be well-informed, accesible, and dynamic enough to adapt to fast-changing requirements.