All On Demand articles – Page 6
-
WebinarThe CISOs Role in Driving Trust: Why it Matters, How to Define it, and What Success Looks Like
Watch this session, The CISOs Role in Driving Trust: Why it Matters, How to Define it, and What Success Looks Like with OneTrust’s GRC Offering Lead. Gain insight on why more companies are naming chief trust officers, creating formalized trust initiatives, and measuring trust as a metric for themselves and their business partners.
-
VideoGDPR Compliant? The Extra Steps You’ll Need to Take to Comply with South Africa’s POPIA
The EU’s General Data Protection Regulation (GDPR) is often cited as the world’s toughest data protection law. Many organizations have worked hard to bring themselves into GDPR compliance.
-
VideoKeeping Calm and Compliant in the Face of Data Protection Uncertainty: A Conversation with Robert Baugh, CEO of Keepabl
GRC World Forums Analyst and Research Director Robert Bateman asked Robert Baugh, CEO of Keepabl, about his experiences working with UK data protection professionals over a turbulent few years professionals on keeping calm and compliant in this fast-changing and complex field
-
WebinarDynamic Data Discovery as the Foundation of your Privacy Program
Data discovery and mapping is the first step towards building an effective privacy program. But traditional data discovery is resource-intensive, static, and incomplete. Modern data discovery tools are rising to these challenges: always-on, secure, and deeply integrated with privacy management software. These advances open up exciting use cases like dynamic ROPAs and DPIAs. With the right approach, you can build efficiency and effectiveness for your legal and data teams.
-
WebinarHow OSINT can be used to investigate environmental crimes
In this webinar, we will shine a spotlight on environmental crime: one of the 22 crimes named in 6AMLD’s expanded list of predicate offences.
-
WebinarWhen Good Data Goes Bad: How to Shine a Light on Sensitive, Toxic, and Risky Data
With numerous state-based (California, Virginia, Colorado….) privacy regimes now in place, the mishandling of sensitive data won’t be tolerated – by regulators or consumers. The challenge is: with mounting volumes of user created data under management, most of which is “dark”, how can you protect what you don’t even know you have?
-
WebinarOperationalizing privacy: A key to legal defensibility for in-house Counsel
There was a time when a successful privacy program could only rely on documentation, checklists, spreadsheets, and emails. However, the complexity of today’s privacy concerns necessitates smarter, faster, and more scalable solutions, and the old programs must become pragmatic.
-
WebinarCritical Data Collection Methodologies and Use Cases
Each legal case or investigation has its own unique challenges, objectives, and goals. Experts must understand how to work with proven, advanced technologies to deliver a methodical and defensible data collection approach – regardless of whether it’s for a forensic investigation or e-discovery matter.
-
WebinarThe Art of Innovating Securely in The Cloud
As the threat and regulatory landscape continues to evolve, along with the acceleration in remote working and access to data, how do you protect your most prized assets, whilst growing innovatively and securely, and delivering a seamless customer experience?
-
WebinarEmbracing today’s privacy landscape and leaning into privacy management
We are sharing data more than ever before and while it has simplified day-to-day business, it has also increased considerations for organizations across the globe. Countries are passing regulations with comprehensive privacy requirements and within the next two years, 53% of countries will have GDPR-like regulations.
-
WebinarWhy your law firm needs to layer your email security in Microsoft 365 for maximum protection
Risks to your law firms’ email security have never been greater. With remote work still as popular as ever and an explosion in digital transformation projects, there is an increase in the risks of outbound data loss. In fact, we know that 85% of law firms using Microsoft 365 had an email data breach in the last 12 months.
-
WebinarData Awareness to Data Intelligence: Leveraging the power of automation
The increasing number and complexity of privacy laws, like the upcoming California Privacy Rights Act, as well as the continued emergence of good privacy practices and compliant data use as a competitive differentiator have been the driving force for organizations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
WebinarNot All Assurances are Created Equal – Assessed Entities and Relying Parties Beware!
With the cyber threat landscape constantly evolving, and the number and complexity of business-vendor relationships continuously growing, there is an increasing market need for reliable assurances.
-
WebinarThe Future of Anti-Financial Crime? Enhancing Effectiveness with the Investigator-Centric Approach
In this webinar we will discuss how FIs can apply innovative approaches developed for national security and law enforcement agencies to enhance the efficiency and effectiveness of their anti-financial crime controls.
-
VideoInvestigating the Kleptocrats: A fireside chat
Robert Bateman, Analyst and Research Director at GRC World Forums speaks with Casey Michel on investigating the kleptocrats.
-
VideoRegulator Rhetoric, Tech Realities
A discussion of how well regulators are actually doing - beyond the rhethoric - in terms of supporting and promoting regtech solutions, and how the private sector would engage with regulators on the topic.
-
VideoNew US Frontiers
A discussion of current developments in the US AML/CTF regime, especially investments in FinCEN and the progress of the beneficial ownership registry, as well as what these mean for US businesses.
-
VideoAssessing the RegTech Impact
Discussion of how regtech has so far impacted on the development of anti-financial crime, and whether it has improved efficiency or effectiveness more.
-
VideoPutting it to the Test
Exploration of how AFC platform testing is shifting from internally driven mechanisms such as back testing to the use of synthetic data and automatic penetration testing.
-
VideoInside the Criminal’s Handbook
Exploration of how mechanisms to share criminal typologies have developed between firms, as well as the development of technology solutions that can help firms know what to expect next from the criminals.


