Most Popular Content – Page 326
-
VideoThe Future of Work - Short and Long Term Upheavals
The COVID-19 crisis has hugely accelerated changes in the way society thinks about the basic principles of work.
-
VideoWhere’s the Data How to Find Your Biggest Governance, Security, and Privacy Risks
Over the last decade, data has become the driving force behind businesses, economies, and daily life. But sometimes, something as simple as knowing what data you have, and where that data lives within (and outside of) your organization, can be your biggest governance, security and privacy risk.
-
VideoWhat Does a Successful Data Access Governance Programme Look Like?
Strong walls only get you so far – the nature of a best practice approach to data access governance is to increase the focus on how data is controlled internally.
-
VideoHarmonisation of Data Protection Regulations Across the Region
Harmonisation of regulation across the major APAC economies continues to be a major theme of 2020 and 2021
-
VideoArtificial Intelligence Data Privacy & Cyber Security Assurance
The region’s economic growth and technical innovation over the last two decades has resonated through almost all industries but what will the coming years bring in terms of APAC’s influence over AI, privacy and security?
-
VideoData Discovery: What Skeletons are Hiding in Your Unstructured Data?
With the ever-increasing use of data and number of digital threats to organisations, data breaches are unfortunately commonplace.
-
VideoBrexit and Data Protection: How to Prepare in a State of Uncertainty
Every sector – from retail to financial services, BigTech to media – is affected in different ways by the ramifications of the UK’s departure from the EU.
-
VideoInternal Threats: Top Threats to your IT Security and how to Address Them
From employees accidentally clicking on malicious links, to sabotage, theft of data and unauthorised access, companies have plenty of potential insider cyber security threats to consider.
-
VideoHow to Prevent Credential Stuffing Attacks While Managing Risk and Trust
Credential stuffing is a brute force attack that can be low-risk, high-reward for cyber criminals. This panel will debate the defence techniques that can be used to guard against this threat.
-
VideoGDPR Requirements and Digital Transformation
Digital technology is transforming the way businesses operate around the world and data has never been able to be shared so quickly and easily in real time. However, the General Data Protection Regulation requires data usage to be lawful, fair and transparent, with strict requirements to minimise and limit the purpose of data.
-
VideoEffective Zero Trust: How Zero Trust Can Help Secure Your Business
Zero trust can deliver greater security, less demanding workloads, reduced IT complexity and can be used to improve data protection and user experience.
-
VideoEngaging Your Line of Business for Cybersecurity Initiatives
Security cannot be done in a silo. The extent and nature of data shared across line of business functions both internally and externally fuels instances of system and organizational vulnerabilities.
-
VideoThird Party Risk Management under GDPR: Ownership and Risks, Fines and Solutions
Data breaches via third parties are a growing problem for GDPR compliance.
-
VideoData Privacy and Integrated Technologies
The rapid development of new technology presents organisations, regulators and society with data privacy and security risks. In our interconnected world, personal data can be shared between devices, networks and borders rapidly.
-
VideoRegulatory Developments: POPIA and the Principles of Enforcement Action
South Africa’s Protection of Personal Information Act (POPIA) comes into enforcement from 1st July 2021.
-
VideoEnvironmental, Social, and Corporate Governance: Why a Privacy-Focused Company is a Sustainability-Focused Company
Holding less data means less storage, less power usage and this is better for the environment. In short, be lean with data, less power, more profit, better for the environment.
-
VideoWomen and Diversity in Cybersecurity: Why Are We Still Having this Conversation?
Recent research by Tessian found that a higher proportion of young men were likely to consider a career in cyber security than young women.
-
VideoSchrems II and International Data Transfers: The Journey to a new Privacy Shield and Who Is Leading the Way
Companies are still feeling the impact of the European Court of Justice decision last July that torpedoed the Privacy Shield, raising huge question marks about the future of international data transfers between the EU and US.
-
VideoIT vs OT: Is There Too Much Operational Technology Online for Hackers?
The attack on the Colonial Pipeline was one of the most major hacks in the history of critical infrastructure. But, this was not a hack on Colonial Pipeline’s IT, but their Operational Technology. The pipeline, which normally carries 2.5m barrels a day, is digital in terms of its operations.
-
VideoAre you ignoring the elephant in the room - Your Organization’s Data?
Everyone is talking about compliance and fines when it comes to an organization’s data. Fines must not be the driving factor to take control of your data. It must start with Trust.









