All On Demand articles – Page 12
-
WebinarTackling the Expanding ‘Shadow IT’ Environment
The ever-growing extension of the official IT environment is one of the biggest challenges for digital forensics practitioners today.
-
VideoThe GRC Red Flag Series: Operational Resiliency and the Future of Risk & Resiliency Management
Access the on-demand video for The GRC Red Flag Series: Operational Resiliency and the Future of Risk & Resiliency Management
-
WebinarData Acceleration in the Era of Accelerated Cloud Transformation and Remote Work
Based on the findings from 2021 Thales European Data Threat Report, the global pandemic has had a significant impact on data security with accelerated cloud migration and increased remote working.
-
VideoGRCTV: Risk Quantification and Surveillance Advertising
Access the on-demand videos below from GRC TV - risk quantification & surveillance advertising
-
WebinarWhere are you on the Data Provisioning Maturity Model?
The data provisioning maturity model acts as both a measuring stick and common framework for organizations to help illustrate what is needed to understand and ultimately improve their data protection program.
-
WebinarInstant payments need instant screening
Everyday millions, if not billions, of transactions flow through the financial system. At the same time the consumer and commercial demand for instant payments is increasing, shrinking the transaction processing window.
-
WebinarPrivate Healthcare: Why do you need intelligent email security?
Email is a vital communication tool for organisations globally. But email is the top security risk for healthcare providers as employees accidentally leak data everyday.
-
-
WebinarData Retention: The Achilles Heel of Global Privacy
Consumers around the world are demanding more protection for their personal information. Data breaches are daily occurrences, and the scope of privacy has widened to include how your organization limits the risk of improper use or exposure of personal data.
-
WebinarGRC in 2021 - Demonstrate Value Fast with your Program
Today’s distributed, dynamic, and disrupted business has to navigate the velocity of risks which demands agility, resilience, and integrity.
-
SponsoredInsider Risk Management: Intelligently investigate and take action on insider risks
In this session, you will learn how to leverage Microsoft insider risk management. If you are looking for ways to improve your security and compliance posture, this session is for you!
-
VideoWhat Do The New Standard Contractual Clauses (SCCs) Mean for Data Transfers Post-Schrems II?
The European Commission has adopted a newly updated version of the Standard Contractual Clauses (SCCs), which are the most commonly used legal mechanisms for transferring personal data and international companies rely upon this hugely.
-
VideoA Celebrity’s Desire for a Privacy Framework
We may envy their bank accounts, their houses, their cars and their lifestyle, but a celebrity almost signs a contract of constant availability and lack of privacy as their fame rises.
-
VideoA Fireside Chat with Johnny Ryan
Johnny Ryan, Author, Senior Fellow at Irish Council for Civil Liberties, and Open Markets Institute. Self proclaimed sufferer of “adtech remorse”.
-
VideoWhere Does a CISO’s Role Go From Here?
Sudden digital transformation has put the role of the CISO in the spotlight with many in the cybersecurity industry suggesting that the title has become overused. Others may associate the role of the CISO as being innovation or cloud averse.
-
VideoPolitics, Economics, Social: Russia’s State-Led Cyber Espionage and Influence Operations
Whether it be the SolarWinds attack, the 2016 US election interference, or a number of other cyber operations over the past few years, there’s a growing perception/reality that Russia is increasingly flexing its cyber muscles internationally, using the lessons its learned through years of focused cyber-attacks and influence operations in Ukraine and other regional adversaries.
-
VideoConfidential Computing: The Next, Great, Development in Data Protection
A recent IBM IBV study said 74% of CEOs think adoption of cloud will be critical for their businesses in the next two to three years.
-
VideoThird Party Risk Management: Regulatory Developments and the Impact on Vendor Risk Management (VRM)
Covid-19 has led to Enterprise organizations increasing their focus on Third Party Risk Management. But global regulatory developments have also had an effect upon companies challenges to do enough due-diligence to identify vendor risks.
-
VideoImprove Your Compliance and Reduce Expenditure: Data Retention Done The Right Way
Why do most organizations fail to make their data retention policies operational? A strong Data Retention Policy will provide benefits across legal and compliance activity, and reduce costs as well.
-
VideoWeb, Mobile, OTT & CTV: How to Make Consent & Privacy an Asset, Not a Hurdle
It’s no secret that we’re living in multi-device world. Never before have we been able to watch, listen to, download, and read the content we want, on the devices we own. At the same time, consumers are extremely conscious about their privacy and digital footprint.


