All PrivSec Global On-Demand articles – Page 4
- 
      
         Video VideoCould Meta Really Pull Out of Europe? The (Unintended?) Consequences of International Data Transfer RulesSchrems II affected many companies’ ability to transfer data from the EU to the US. Meta has repeatedly stated that an order to stop transfers could force the company to stop offering Facebook and Instagram services in Europe. 
- 
      
         Video VideoDraft EU Legislation You Need to Know: AI Act, Cyber Resilience, Data Act and MoreThe GDPR changed the data protection sector immeasurably. But other upcoming EU laws could be equally significant in other ways. 
- 
      
         Video VideoData Rights Management: Creating a Seamless, Efficient and Compliant ProcessData subjects are becoming increasingly aware of their data rights (Article 15) through to automated individual decision-making (Article 22). The challenge is, how do data controllers continue to meet the increasing demand for such requests. 
- 
      
          
- 
      
         Video VideoBridging Borders: How to Manage International Data TransfersPersonal data can be an organization’s most valuable, but also riskiest type of data. This data is governed by an ever-evolving regulatory landscape as reflected by the complexity of managing cross-border data transfers. Most recently the Schrems II case which has highlighted the direct conflict between US surveillance law and EU data protection. 
- 
      
         Video VideoPreparing for the UK’s GDPR and PECR ReformsData protection practitioners in the UK have had a rocky couple of years. From Dominic Cumming’s 2018 comments on “binning” the “idiotic” GDPR, to the TIGRR Report, the DCMS consultation and the now possibly-binned Data Protection and Digital Information Bill. 
- 
      
         Video VideoBest Practices for Detecting, Preventing and Recovering From RansomwareRansomware continues to cause huge losses and harms across the globe. But taking a proactive approach to security and business continuity can reduce the likelihood of falling victim to an attack—and reduce the damage that occurs if you are targeted. 
- 
      
         Video VideoExploring the Updates to ISO/IEC 27001This panel will explore the updates to the ISO/IEC 27001 framework—what’s new? What stays the same? And what do organisations need to do to maintain compliance with the new version? 
- 
      
         Video VideoThe Dangers of AI-Driven Mass SurveillanceArtificial intelligence is driving huge improvements in fields as diverse as medicine and climate monitoring. But from biometric identification to “social credit” scoring systems, AI is also providing new ways for governments and large corporations to track and surveil people—with significant implications for their privacy and freedom. 
- 
      
         Video VideoCan Privacy Enhancing Technologies (PETs) Solve the Data Transfer Puzzle?The legal issues around data transfers continue to cause confusion and consume resources. Many believe the solution lies in Privacy Enhancing Technologies (PETs). The US and UK governments are even collaborating on an “innovation prize challenge” to encourage the development of PETs for data transfers. 
- 
      
         Video VideoBeyond the US: A Look At Transfers to Other Third CountriesThe focus on data transfers post-Schrems II has been squarely on the US. But the same rules apply to any third country without an adequacy decision. 
- 
      
         Video VideoData Protection Update: United KingdomThe UK is set to overhaul its data protection and privacy rules, with changes to cookies, accountability and regulation all on the table. 
- 
      
         Video VideoInsider Threats: Detecting and Mitigating the Threat From WithinInsider threats can lead to devastating security incidents—whether intentional or negligent, and perpetrated by a from a trusted employee, ex-employee, or contractor. 
- 
      
         Video VideoData Protection Update: United StatesConnecticut and Utah joined the ranks of US states with a comprehensive privacy law this year. The privacy patchwork continues to stitch itself together—but how should privacy professionals respond. And is anyone still hoping for a federal privacy law? 
- 
      
         Video VideoHow to Manage Third-Party Risk in Your Supply ChainSupply chain risks take many forms and can be devastating to your organisation if not properly mitigated. From cybersecurity to reputational and legal issues, managing risk among your vendors and other third parties can be a daunting task. 
- 
      
         Video VideoKeeping Pace with Emerging ThreatsCyber criminals are leveraging innovative techniques and taking advantage of new security vulnerabilities. Organizations must evolve and adapt their defenses to protect against the next wave of cybersecurity threats. 
- 
      
         Video VideoSecure SAP Development at the Speed of Digital TransformationSAP applications are the cornerstone of business operations and have become a top attack vector for enterprises.The need for secure development and testing of applications have never been greater. Yet there is a lack of tools that sufficiently support SAP languages, components, and development environments, resulting in the use of manual code reviews which are error prone. 
- 
      
         Video VideoThe human element: Fixing the behaviors that lead to breachesCybercriminals continue to launch increasingly sophisticated social engineering attacks. Coupled with a rise in human error, it’s no surprise that 85% of today’s security breaches involve a human element. 
- 
      
         Video VideoConducting a Transfer Impact Assessment: Best PracticeThe transfer impact assessment (TIA) might be among the most demanding of the GDPR’s requirements. Assessing the surveillance regime of a third country can be a daunting task even for an experienced legal department—not to mention the thousands of SMEs engaged in international data transfers. 
- 
      
         Video VideoChoosing the Right Cybersecurity FrameworkImplementing a cybersecurity framework is a great way to improve your company’s security posture. But there are a lot of frameworks to choose from, and their suitability varies depending on your company’s industry, size and resources. 
 










