All On Demand articles – Page 17
-
WebinarLegal Governance, Risk and Compliance (Legal GRC) by Design
Organisations need an integrated strategy, process, information, and technology architecture to govern legal, meet legal commitments, and manage legal uncertainty and risk in a way that is efficient, effective, and agile.
-
WebinarGDPR 3 Years On
Three years on from the entry into force of the GDPR and the privacy landscape is still as complex as ever. The past 12 months have continued to be wrought with action and a heightened sense of privacy awareness.
-
VideoThe GRC Red Flag Series with Michael Rasmussen - GRC Orchestrate with ING
Access the on-demand video for The GRC Red Flag Series with Michael Rasmussen: GRC Ochestrate featuring ING
-
WebinarUS Data Privacy: Latest Regulations and Implementing Compliant and Defensible Practices
State-level momentum for comprehensive privacy bills is at an all-time high. After the California Consumer Privacy Act passed, multiple states proposed similar legislation to protect consumers in their states.
-
WebinarThe Conversation Continues: Where International Data Transfers Stand
You may sometimes get the feeling no progress is being made to solve the issue of transferring personal data from the European Union to other countries around the world. After the draft EDPB Recommendations and draft model Standard Contractual Clauses, no major changes have been communicated.
-
WebinarSo many assessments, so little time: How to prioritise when everything’s on fire
Risks are ever-changing, and often move faster than a privacy teams’ agenda can keep up with. That means you’ll have to make hard decisions about what actually gets done, whether you’re conscious of it or not.
-
WebinarLegal tech considerations for the future of remote work
Last year, legal teams across the globe were caught unaware by the sudden necessity of remote work and the ensuing explosion of data that went along with it.
-
WebinarBeyond the Perimeter: A New Data-Centric Model for Breach Preparedness and Rapid Response
For decades, technology leaders have focused on building a strong perimeter around their networks. But that approach to cybersecurity is no longer sustainable or effective: Globally distributed teams and supply chains have dramatically changed the way organizations create, store, and share data.
-
SponsoredMicrosoft Session: Manage the retention of content to comply with privacy regulations
Privacy regulations restrict the way companies can use, manage, and retain customer and employee data. How can you ensure you comply with the retention laws around private data? This session will show how Microsoft Information Governance helps to identify and govern customer and employee data automatically.
-
WebinarSix key steps to operationalizing data privacy governance
In this webinar, you will be introduced to Informatica’s data governance for privacy model that brings together business and technical policy stakeholders to operationalize data discovery, classification, identity mapping, risk analytics and data protection.
-
WebinarThe Crucial Challenges Every Organisation Must Address
Changing legislation and increased risk from lawsuits from inadequate incident and breach management processes is a challenge for every General Counsel in 2021.
-
WebinarMaking the most of multi-cloud Backup as a Service: Nine things to consider
Ask anyone how much they love backup and you get the same response. Laughter. It doesn’t have to be like that, especially if you’re looking for the right solution to handle your on-premises and public cloud IT environments.
-
WebinarTracking US Privacy Laws
This year, multiple states have introduced, reintroduced, or will make effective new privacy laws. While all eyes have been on the California Consumer Privacy Act (CCPA), there are many other notable federal and state-level laws you should know.
-
WebinarIdentifying quick wins to enable data trust from an enterprise data governance program
The journey to data privacy governance is no easy task, especially when there is no vision of how data trust is connected to your business goals.
-
VideoDue Diligence in the Age of Digital ID. A Revolution in Anti-Financial Crime?
Knowing and trusting who customers are is the primary responsibility of due diligence.
-
VideoTechnological Promises, Criminal Realities. A conversation between Julian Dixon and Oliver Bullough
In the past decade, the ‘Regulatory Technology’ sector, or ‘RegTech’, has developed quickly in response to the need to manage existing financial crime risks better, enabled by the growing capacity and capability of evolving technologies themselves.
-
VideoCase Study: The Role of Digital Behavior in Identifying Mule Accounts
Money mules have become a modern day gold rush for cybercriminals.
-
VideoThe Cyber-Fincrime Nexus The Impact of COVID-19 and the Next Steps
Even before 2020, law enforcement agencies had been warning of a growing nexus between cyber and financial crime, and an expanding role from international serious organised crime groups.
-
VideoTransforming Compliance into Risk Management. A presentation by Michael Rasmussen
Regulators consistently talk about the need for a ‘risk-based approach’ to financial crime, and many organisations have created ‘risk management’ functions to complement, and in some cases replace, legacy compliance functions. This shift is based on a recognition that it is not just what you do, it is how you do it that matters. Financial criminals are agile and reflexive, and those that seek to stop them need to be so in response.
-
VideoEffective Financial Crime Risk Management. How do we evidence what we are doing in AFC is actually effective?
We have started to see a shift in the AFC community, as the pressure from regulators for firms to achieve good outcomes in financial crime prevention increases. There is likely to be greater focus on how outcomes are measured and how confident firms are that their controls are effective at tackling financial crime.


