All Privacy Intelligence articles – Page 22
-
VideoData Privacy Challenges in Recruitment
The data privacy challenges created by the enormous increase in remote working have been well documented – but the pressure to protect data is particularly acute for organisations that rely on large numbers of contract staff.
-
VideoUS Privacy and Security - Healthcare After a Crisis
The US experience of the coronavirus pandemic represents a special case in terms of a country’s response - its size, federal structure and healthcare system combine to create significant challenges, including for privacy professionals.
-
VideoThe Future of Work - Short and Long Term Upheavals
The COVID-19 crisis has hugely accelerated changes in the way society thinks about the basic principles of work.
-
VideoUsing Technology to Build User Trust Through Data Transparency and Control
Speaker Panel Using Technology to Build User Trust Through Data Transparency and Control Video: Simplifying Privacy Compliance - Using Technology to Build User Trust Through Data Transparency and Control
-
VideoConsumer Trust, Consent and Privacy Rights
From “fake news” to election tampering, the political and ethical aspects of advertising technology have rarely been more publicly debated.
-
VideoYour Privacy Awareness Training Program
Your staff are both your biggest weakness and strength. If your employees don’t know how to handle data at your organization compliantly, it could have an impact on reputation and resources.
-
VideoUS Privacy Laws - State-Level Approaches to Data Privacy
The development of state-level regulation on data protection is likely to upend the current paradigm relationship between individuals and private business – we review the regulatory direction of travel and what the next two years are likely to bring.
-
VideoProtecting Data and Ensuring Compliance Posture in the Hybrid Work Environment
We have seen two years’ worth of digital transformation in only a few months. Most of Microsoft’s enterprise customers (and even Microsoft itself!) had to quickly transform the way they assess new and complex risks in the wake of remote work.
-
VideoSchrems II and Beyond: the Future of Data Transfers
The case brought by activist lawyer Max Schrems to the European Court of Justice has shaken up the foundation for the legal transfer of data between the EU and US with global ramifications.
-
VideoArtificial Intelligence Data Privacy & Cyber Security Assurance
The region’s economic growth and technical innovation over the last two decades has resonated through almost all industries but what will the coming years bring in terms of APAC’s influence over AI, privacy and security?
-
VideoTo Trust, or Not to Trust the Cloud That is Your Compliance and Risk Question
Many organizations struggle with digital transformation and cloud computing, particularly when implementing a framework to meet their compliance requirements.
-
VideoEdgar Perez in Conversation
One of the world’s foremost experts on how organisations can harness bleeding edge technologies to give themselves competitive edge, Edgar Perez will share his insights into how the world’s leading companies are changing their business models to leverage technical change.
-
VideoStaying Competitive while Maintaining Global Regulatory Compliance
From managing risk to creating edge: how data protection practitioners are helped to build competitive advantage for their organisations.
-
VideoBest practice advice on data sharing requests policy
The regulatory regimes across the Middle East and North Africa are going through a stage of rapid development and alignment, creating challenges for companies doing business across the region.
-
VideoWhy It’s Time to Rethink Your Approach to Data Classification
How can enterprises know their data in a fragmented data landscape of diverse data formats, schemas, content, and metadata types? Why haven’t we solved the classification conundrum - and how can security and privacy teams lead the charge for next-generation classification?
-
VideoThe Zero Trust Model - Securing Your Sensitive Data
Speaker Panel The Zero Trust Model - Securing Your Sensitive Data Video: The Zero Trust Model - Securing You…
-
VideoWhat Does a Successful Data Access Governance Programme Look Like?
Strong walls only get you so far – the nature of a best practice approach to data access governance is to increase the focus on how data is controlled internally.
-
VideoData Discovery: What Skeletons are Hiding in Your Unstructured Data
Unstructured data is a compliance risk. Examples of this type of data can include the content of email messages and spreadsheets through to business plans and intellectual property.
-
VideoBusiness resilience and continuity in a time of uncertainty
Business continuity planning allows organisations to respond, resume and restore operations in the event of disruptions.
-
VideoThe road to operationalizing security and privacy visibility and controls
KeyBank’s compliance transformation: The road to operationalizing security and privacy visibility and controls


