Most Popular Content – Page 340
-
VideoProtecting Data and Ensuring Compliance Posture in the Hybrid Work Environment
We have seen two years’ worth of digital transformation in only a few months. Most of Microsoft’s enterprise customers (and even Microsoft itself!) had to quickly transform the way they assess new and complex risks in the wake of remote work.
-
VideoDavid Rowan on Biology is the new in software and what this means for data privacy
David Rowan was Editor-in-chief of the UK edition of WIRED magazine from launch in 2009 to February 2017 and is the. author of ‘Non-Bullshit Innovation’,
-
VideoOpening Keynote: Wojciech Wiewiórowski
The European Data Protection Supervisor, Wojciech Wiewiórowski will give introductory remarks to the privacy stream of PrivSec Global, discussing the current data protection landscape during uncertain times.]
-
VideoPost Schrems lI: Completing a Transfer Risk Assessment
Following the Schrems-II decision, organisations are obliged to assess all International data transfers on a case-by-case, to ensure the essentially equivalent standard can actually be achieved.
-
VideoPrivacy at the Margins: Data Protection Issues for Vulnerable Groups
In this session, Scott Skinner Thompson, author of the new book ‘Privacy at the Margins’, will highlight how different marginalized groups are uniquely harmed by privacy violations and will explain the legal relationship between private-party surveillance and government surveillance.
-
VideoPrivacy Leaders: Creating a Team Fit for the Future
The skills and behaviours that were the foundations of a successful team are never static.
-
VideoData Protection Update: Asia-Pacific
With a fast-developing and diverse set of laws and regulations, aligning your privacy program to ensure legal compliance across the APAC region can be a challenge.
-
VideoVendor Risk Management: Can You Trust Vendor Risk Questionnaires?
Vendor risk management questionnaires are often seen as a vital part of the TRPM due diligence process. But how far can you trust your vendors’ responses?
-
VideoDigital Identity: Will We Ever See a World Without Passwords?
Even with good password management techniques, passwords are a flawed approach to account security. Many of the world’s major tech companies are proposing alternative mechanisms to verify identity and manage access. But what works best—and are there privacy trade-offs?
-
VideoWhy Effective Process and Governance is as Important as Technology When IAM issues arise
When IAM issues arise, organizations often lean too heavily on implementing technology with the idea that it will solve all issues related to identity and access.
-
VideoShould Everyone Have a Digital Identity?
Governments worldwide are developing digital identity schemes that, they claim, will improve bureaucracy and ensure fairer access to state welfare. But privacy campaigners are skeptical about the prospect of every individual’s identity being digitised.
-
-
VideoNFTs: Just a Craze or Here to Stay?
Many non-fungible token (NFT) investors are not yet seeing the returns they hoped for. But some argue that the price of NFTs could rebound—and that the truly game-changing nature of NFTs has yet to be realised.
-
VideoData Centres: Just How Bad Is the Environmental Impact?
Data minimisation and storage limitation are key principles of data protection. But alongside the impact on privacy, minimising the amount of personal data you’re processing has another benefit: reducing carbon emissions.
-
VideoHow to Avoid Software Supply Chain Attacks
From Solarwinds to Kaseya to Log4j—the security risk from software supply chain attacks shows no sign of abating.
-
VideoBuilding a Privacy Management Program
A privacy management programme must be well-informed, accesible, and dynamic enough to adapt to fast-changing requirements.
-
VideoRe-Thinking Trusted Data
The explosive growth of data and the value it creates calls on data professionals to level up their programs to build, demonstrate, and maintain trust. The days of fine print, pre-ticked boxes, and data hoarding are gone and strong collaboration from data, privacy, marketing and ethics teams is necessary to design trustworthy data-driven practices.
-
VideoThe ROI of Data Privacy
Turning privacy into a business enabler by raising data privacy awareness and business accountability with key GDPR requirements. Implementing a data privacy programme that will channel data privacy to boost revenue, market reputation & customer trust leading to a meaningful ROI. Video: The ROI of Data Privacy ...
-
VideoChoosing the Right Cybersecurity Framework
Implementing a cybersecurity framework is a great way to improve your company’s security posture. But there are a lot of frameworks to choose from, and their suitability varies depending on your company’s industry, size and resources.
-
VideoConducting a Transfer Impact Assessment: Best Practice
The transfer impact assessment (TIA) might be among the most demanding of the GDPR’s requirements. Assessing the surveillance regime of a third country can be a daunting task even for an experienced legal department—not to mention the thousands of SMEs engaged in international data transfers.









