More Protective Security Content – Page 16
-
SponsoredData locality is a compliance control, not a security control
Data locality is increasingly seen as important, but is there confusion as to why it matters? Microsoft’s Mark Anderson explains what he believes to be the real reason for its importance
-
NewsUAE suffers “250% increase” in cyber attacks this year
Cyber attacks have risen sharply this year, according to Mohamed Al-Kuwaiti, Executive Director of the UAE’s National Electronic Security Authority, CNBC reported.
-
VideoUnderstanding Security Regulations and Compliance
Cyber compliance requirements can vary in complexity and be imposed by law enforcement, regulatory bodies and even industry groups.
-
VideoEU Regulator Interview
Andrea Jelinek, Chairwoman, European Data Protection Board, Head of the Austrian Data Protection Authority discusses the current data protection landscape in Europe and beyond with President of the National Association of Data Protection Officers, Stewart Room.
-
VideoAn Interview with Daniel Solove
Daniel J. Solove is the John Marshall Harlan Research Professor of Law at the George Washington University Law School.
-
VideoThe Deployment of AI, ML and Emerging Technologies in Cyber Defence and Attack
The deployment of new and cutting-edge technologies like Machine Learning and Artificial Intelligence can help security specialists to analyse and correlate data to identify patterns, scan various risks, gain predictive insights and forecast potential breaches.
-
VideoData Protection and Security in the Cloud
As the cloud environment continues to develop and new mechanisms are introduced which affect organisations’ strategies, opportunities and risks grow in complexity.
-
VideoDisposing of Data Securely & Completely in a Post-Covid World
Drawing on industry research, best practices and case studies, we’ll explore why enterprises must address end-of-life data more efficiently and precisely than ever before.
-
VideoBuilding a Risk Management Framework for the Future
Managing risk is at the heart of any data protection programme and building a strategy which can navigate changes in market and business strategy is crucial.
-
VideoIdentifying Risky Vendors: 7 Warning Signs You Shouldn’t Ignore
For individuals managing third-party risk, there is one primary question that needs answering: Are your vendors safe to do business with?
-
VideoUsing Security as a Tool to Build Competitive Edge
Security functions in some leading organisations are beginning to move beyond just their role as defence mechanism and are defining the role they can play in contributing to the overall strategic vision.
-
VideoEmbedding Security and Risk Management into Your Organisation
Cyber security plays a critical role in helping digital businesses to flourish.
-
VideoData Discovery: What Skeletons are Hiding in Your Unstructured Data?
With the ever-increasing use of data and number of digital threats to organisations, data breaches are unfortunately commonplace.
-
VideoJeff Lanza on Cybercrime: Strategies to Prevent, Protect and Prevail
From computer intrusions to ransomware, a 20-year veteran FBI special agent and cyber security expert traces the evolution of the cybercrime “pandemic” and provides countermeasures to combat the global threat.
-
VideoEngaging the board: How your board can be ready for crisis
Engaging the board is an ongoing challenge in cyber security for a variety of reasons: what seems like a uniquely technical issue is actually a complex business risk present across different business functions.
-
VideoBest Practice for Incident Response
Effective incident response is a key component of being able to contain and respond to a breach.
-
VideoBuilding Your Security Dream Team
How can you guarantee that your security team has the right skills and resources to implement your cyber security plan?
-
VideoHow Diversity Can Enable Organisations to Combat Security Risks
A diverse cybersecurity team is critical to generating ideas and processes needed to confront security risks.
-
VideoThe Evolving Security Landscape - Trends to Expect in 2021 and Beyond
What is the current state of cybercrime and what are the common types of incidents being reported?
-
FeatureSecure foundations: an interview with Zoë Rose
PrivSec Global speaker Zoë Rose talks us through her journey into cyber security and her thoughts on common enterprise mistakes.


