All PrivSec Global On-Demand articles – Page 17
-
VideoConsumer Trust, Consent and Privacy Rights
From “fake news” to election tampering, the political and ethical aspects of advertising technology have rarely been more publicly debated.
-
VideoYour Privacy Awareness Training Program
Your staff are both your biggest weakness and strength. If your employees don’t know how to handle data at your organization compliantly, it could have an impact on reputation and resources.
-
VideoUS Privacy Laws - State-Level Approaches to Data Privacy
The development of state-level regulation on data protection is likely to upend the current paradigm relationship between individuals and private business – we review the regulatory direction of travel and what the next two years are likely to bring.
-
VideoThe 2020 Presidential Election and the Prospects for Change
The US presidential election will be the most contentious and era-defining of the modern age – whoever wins, the implications across government policy will be profound and privacy and security are no exceptions.
-
VideoProtecting Data and Ensuring Compliance Posture in the Hybrid Work Environment
We have seen two years’ worth of digital transformation in only a few months. Most of Microsoft’s enterprise customers (and even Microsoft itself!) had to quickly transform the way they assess new and complex risks in the wake of remote work.
-
VideoSchrems II and Beyond: the Future of Data Transfers
The case brought by activist lawyer Max Schrems to the European Court of Justice has shaken up the foundation for the legal transfer of data between the EU and US with global ramifications.
-
VideoHarmonisation of Data Protection Regulations Across the Region
Harmonisation of regulation across the major APAC economies continues to be a major theme of 2020 and 2021
-
VideoTo Trust, or Not to Trust the Cloud That is Your Compliance and Risk Question
Many organizations struggle with digital transformation and cloud computing, particularly when implementing a framework to meet their compliance requirements.
-
VideoEdgar Perez in Conversation
One of the world’s foremost experts on how organisations can harness bleeding edge technologies to give themselves competitive edge, Edgar Perez will share his insights into how the world’s leading companies are changing their business models to leverage technical change.
-
VideoStaying Competitive while Maintaining Global Regulatory Compliance
From managing risk to creating edge: how data protection practitioners are helped to build competitive advantage for their organisations.
-
VideoUsing Security as a Tool to Build Competitive Edge
Security functions in some leading organisations are beginning to move beyond just their role as defence mechanism and are defining the role they can play in contributing to the overall strategic vision.
-
VideoFinancial Data and the Ethical Issues of Technical Innovation
Financials services is one of the most innovative sectors in they way organisations source and use information and this creates multiple challenges for data protection professionals - this panel discusses the practical issues in creating an ethical strategy.
-
VideoBest practice advice on data sharing requests policy
The regulatory regimes across the Middle East and North Africa are going through a stage of rapid development and alignment, creating challenges for companies doing business across the region.
-
VideoWhy It’s Time to Rethink Your Approach to Data Classification
How can enterprises know their data in a fragmented data landscape of diverse data formats, schemas, content, and metadata types? Why haven’t we solved the classification conundrum - and how can security and privacy teams lead the charge for next-generation classification?
-
VideoThe Zero Trust Model - Securing Your Sensitive Data
Speaker Panel The Zero Trust Model - Securing Your Sensitive Data Video: The Zero Trust Model - Securing You…
-
VideoWhat Does a Successful Data Access Governance Programme Look Like?
Strong walls only get you so far – the nature of a best practice approach to data access governance is to increase the focus on how data is controlled internally.
-
VideoData Discovery: What Skeletons are Hiding in Your Unstructured Data
Unstructured data is a compliance risk. Examples of this type of data can include the content of email messages and spreadsheets through to business plans and intellectual property.
-
VideoBusiness resilience and continuity in a time of uncertainty
Business continuity planning allows organisations to respond, resume and restore operations in the event of disruptions.
-
VideoThe road to operationalizing security and privacy visibility and controls
KeyBank’s compliance transformation: The road to operationalizing security and privacy visibility and controls
-
VideoInvesting in Your People: The Value of Security Awareness and Engagement
The best way to secure your network and keep your data safe is to invest in your employees.


