All PrivSec Global On-Demand articles – Page 12
-
VideoPrivacy Program Management panel: Building a Privacy Culture Within Your Organisation
There is no short term fix when it comes to Privacy Program Management (PPM) - it is always ongoing and always contains a transparent set of standards and operational controls to help each step of privacy program development.
-
VideoMulti-Factor Authentication and the Roadmap to an Organisation’s Increased Security
Multi-factor authentication is becoming more widespread as a key tool in the cyber security armoury.
-
VideoVaccine Passes: The Tech, The Law and the Importance of Data Protection and Privacy
The debate will explore the tech and the importance of these passes to our World in this new normal, the law around these to inform our communities and dispel myths, and thought-provoking input from the travel industry about how this technology can help the World to travel again.
-
VideoRisk Assessments of Fast-Tracked Digital Transformation and the Importance of Back-up
Digital transformation is happening rapidly, but businesses have to be extra careful not to put their digital assets at risk.
-
VideoThird Party Risk Management - Ownership and Centralized Risk Assessment Exchanges
Third party providers and suppliers sometimes have access to your organisation’s intellectual property, data, financial, and other sensitive information and custom details. Managing this risk can be complex and onerous.
-
VideoWhy the Future of Trust Must Be Built on Data Transparency
As organizations invest more in Data Protection & Privacy, and regulators increase their scrutiny, this is a perfect moment in time for increased data transparency.
-
VideoTrust: The Children’s Code – Insight and Design at the Heart of Compliance
The privacy regulators have a message for brands – unless you can prove otherwise, you must assume that children – people under the age of 18 years old – are using your digital products and services.
-
VideoBusiness Through the Prism of Cyber
When integrating a new technology into your organization, engaging in or trying to mitigate third party risk, one must think of its cyber hygiene. It starts with understanding where your vulnerabilities are, and how you can efficiently manage it
-
VideoAre you ignoring the elephant in the room - Your Organization’s Data?
Everyone is talking about compliance and fines when it comes to an organization’s data. Fines must not be the driving factor to take control of your data. It must start with Trust.
-
VideoSchrems II and International Data Transfers: The Journey to a new Privacy Shield and Who Is Leading the Way
Companies are still feeling the impact of the European Court of Justice decision last July that torpedoed the Privacy Shield, raising huge question marks about the future of international data transfers between the EU and US.
-
VideoWomen and Diversity in Cybersecurity: Why Are We Still Having this Conversation?
Recent research by Tessian found that a higher proportion of young men were likely to consider a career in cyber security than young women.
-
VideoEnvironmental, Social, and Corporate Governance: Why a Privacy-Focused Company is a Sustainability-Focused Company
Holding less data means less storage, less power usage and this is better for the environment. In short, be lean with data, less power, more profit, better for the environment.
-
VideoThird Party Risk Management under GDPR: Ownership and Risks, Fines and Solutions
Data breaches via third parties are a growing problem for GDPR compliance.
-
VideoData Privacy and Integrated Technologies
The rapid development of new technology presents organisations, regulators and society with data privacy and security risks. In our interconnected world, personal data can be shared between devices, networks and borders rapidly.
-
VideoGDPR Requirements and Digital Transformation
Digital technology is transforming the way businesses operate around the world and data has never been able to be shared so quickly and easily in real time. However, the General Data Protection Regulation requires data usage to be lawful, fair and transparent, with strict requirements to minimise and limit the purpose of data.
-
VideoHow to Prevent Credential Stuffing Attacks While Managing Risk and Trust
Credential stuffing is a brute force attack that can be low-risk, high-reward for cyber criminals. This panel will debate the defence techniques that can be used to guard against this threat.
-
VideoInternal Threats: Top Threats to your IT Security and how to Address Them
From employees accidentally clicking on malicious links, to sabotage, theft of data and unauthorised access, companies have plenty of potential insider cyber security threats to consider.
-
VideoTackling the FinTech Regulatory Landscape: Addressing Challenges in Privacy, Compliance and Cybersecurity
Fintech has disrupted the financial sector dramatically over the past few years. With new, fast services, increased connectivity it has enabled the industry to be quicker and more agile.
-
VideoData Protection or Data Protectionism? The Future of International Data Sharing
Data Protection or Data Protectionism? The Future of International Data Sharing Panel Speakers: Video: Data Protection or Data Protectionism? The Future of International Data Sharing
-
VideoIs Open Banking Really the Future or is it Privacy’s Worst Nightmare?
Open banking has shaken up the financial services industry and has been considered a game-changer to the industry over the past couple of years.


