More from Information Security – Page 15
-
FeatureGDPR Four Years On: How Has the Law Changed the World, and How Can It Be Improved?
The General Data Protection Regulation (GDPR) is perhaps the EU’s best-known and most-misunderstood law.
-
VideoThe Future of ERM: Technologies and Frameworks
From the artificial inteliigence models used to predict and detect risk to the ever-changing regulatory landscape, our last panel of the day will consider what the future holds for ERM.
-
VideoCreating a Robust Data Breach Management Policy
This session will consider the key elements of a data breach management policy, from detection and notification to mitigation and review stages.
-
VideoCombatting ransomware with ServiceNow IRM, Security Operations, and Recorded Future
Join us for our webinar, Combatting Ransomware with ServiceNow IRM, Security Operations, and Recorded Future.
-
Q&AAn Interview with Holly Butterworth, Regional Vice President Delivery, UK & NA at Camms
Holly Butterworth heads up the Camms Services Delivery team in the UK, Europe and North America, leading software implementations in governance, risk, compliance, project and strategic management.
-
ArticleThe Splintering of Global Data Flows: Is the ‘Risk-Based Approach’ Dead?
To combat foreign government surveillance, European data protection regulators are taking an increasingly hardline stance on GDPR enforcement that could drastically change the internet. Some argue that a more pragmatic, “risk-based approach” could help avoid severe disruption. But a recent decision against Google suggests those people are losing the debate.
-
ebookDragos: 5 Critical Controls For World-Class Ot Cybersecurity
How to Align Your Leadership and Implement a Successful Operational Technology (OT) Security Posture
-
ebookDragos: Pipedream: Chernovite’s Emerging Malware Targeting Industrial Control Systems
This report was proactively written and readied for release as the information became public through other avenues
-
AnalysisCash App Data Breach Exposes Over 8-Million Customers
Often when we think of data breaches, we think of external cyber threat actors utilizing ransomware to make a profit. We rarely think that our own employees could be the culprit of a massive data breach.
-
VideoPreventing Supply Chain Attacks: Best Practice
PrivSec Third-Party Risk will explore the ongoing threat of supply chain attacks and provide actionable advice on reducing your risk exposure.
-
VideoFast, smart and connected: a renewed approach to third-party risk management
In this webinar, Anna Mazzone, EMEA VP & Head of Risk & ESG at ServiceNow and Linda Tuck Chapman discuss options for strengthening the process to deliver a more efficient risk assessment process, what are the best companies doing, and how is ESG intersecting with supply chain risk management and third party risk management.
-
FeatureMeet the expert: André H. Paris to appear at PrivSec Focus: Third-Party Risk
Data privacy and compliance consultant, André H. Paris will be speaking at PrivSec Focus: Third-Party Risk.
-
WebinarTRUST with Data Mesh
Do you want to empower your organization with access to trusted data but struggle to govern and manage data at sufficient speed and scale? Advances in data and cloud technology have addressed elements of data volume and processing power but having consistent agility to respond to change is a growing challenge.
-
FeatureMeet the Expert: Vincent D’Angelo will speak at PrivSec Focus: Third-Party Risk
We are delighted to announce that digital business expert, Vincent D’Angelo is to speak at PrivSec Focus: Third-Party Risk.
-
ebookWeaving Data Into Wider Value
Leverage the power of data mesh with Informatica, Wipro and Snowflake
-
NewsEU politicians were victims of Israeli spyware
Hackers have been targeting senior figures at the European Commission, official reports say.
-
NewsIT response plans lacking despite increasing ransomware threat
While the majority of state and local IT leaders in the US consider ransomware and associated cyber-risks to be an ongoing threat to their organisation, almost half of private and public sector entities are yet to put appropriate incident response plans in place.
-
NewsCybersecurity fears now greater than Covid anxiety for global business community
Cyber perils are the biggest concern for companies globally in 2022, with the threat of ransomware attacks, data breaches or major IT outages causing the most anxiety for cyber specialists.
-
NewsNeed to optimise customer experience is powering cloud modernisation
While cloud modernisation is already well underway across global business industries, a desire to enhance customer experience (CX) is having a driving influence on the migration trend.
-
NewsRussian cybercriminals’ campaign hit by FBI, US says
The FBI has seized a huge stash of IT hardware belonging to Russian military hackers, the White House has said.


