All PrivSec Global On-Demand articles – Page 9
- 
      
         Video VideoDigital Identity; Can Governments and the Private Sector work together to take Digital Identity to the next level?This panel will explore the needs for digital identity schemes, the usage of biometric ID systems and what the future collaboration of the Public and Private sector will look like to advance these technologies. 
- 
      
         Video VideoThe Future of Data Protection and Privacy Law; Forget a US Federal Privacy Law: Build Your Compliance Around State LawsThis panel of experts will discuss current states reviewing legislation, which are likely to pass in the next decade, what this will mean for North American privacy, and what the future holds for a federal law under the Biden administration. 
- 
      
         Video VideoThe Scam Who Loved Me: Romance Fraud in the 21st CenturyThis panel brings together experts from the universes of Fraud, Data Protection and the World of Romance to discuss the highs and lows of online love, and what you can do to spot “Catfish” and avoid the ignominy of romance fraud. 
- 
      
         Video VideoSecuring Your Supply Chain: Ransomware: Why a Holistic Approach to Vulnerability Management Works BestPrivSec Global will explore the elements of holistic vulnerability management and consider how it can help your organisation’s resilience against ransomware. 
- 
      
         Video VideoHow Can Regulation Maintain Pace with Healthcare AI?This panel will explore some of the greatest challenges facing regulators, how AI is becoming the most important factor in healthcare, and how this uncharted territory is to be mapped. 
- 
      
         Video VideoKeynote: Deborah WestphallAuthor Deborah Westphal, a leader in future-focused strategy, leverages her experiences working with some of the world’s most innovative business leaders, to show how the interests of people (as human beings, not customers), overlap with those of companies in ways never before seen. 
- 
      
         Video VideoThe Global Cyber-Pandemic; Work’s New Normal and the Increased Battles for CybersecurityWhat lessons have we learned from, what will be done differently now and in the future, and what increasing battles does the cybersecurity universe see in this new normal? 
- 
      
         Video VideoPrivacy, Security and AI Systems; AI Systems and Social Justice: The Great Battle for Human RightsThere are a number of recent examples of human rights violations linked to advances in AI - whether it be algorithms that were created to regulate speech online that have censored commentary on religion or sexual orientation, or AI systems invented to assess illegal activities being used to track and target human rights defenders 
- 
      
         Video VideoManaging risk in a connected world: A systems approach to the demands of managing uncertaintyThe panel will discuss the nature of risk as measurable uncertainty. Soft and Hard systems: two sides of the same coin. 
- 
      
         Video VideoThe Role of Cybersecurity in Enterprise Risk Management (ERM)This session takes a look at how, integrated risk management has become a popular process for managing the risks facing an organisation, and is the new method of choice for business leaders and security managers alike. 
- 
      
         Video VideoWhy enterprise risk management Is key to organizational resilienceThis session takes deep dive into how to initiate an active preparedness strategy in order to become resilient. Types of risks to consider - Thinking about risk differently - Building an ERM plan:Pitfalls and potential stumbling blocks and how to overcome them. 
- 
      
         Video VideoStaff Working from Abroad: What Are the Data Protection and Security Implications?This panel will explore the Data Protection & Privacy and Data Security implications from data flow mapping exercises to data protection impact assessments, and what would be the best practices with staff working remotely in other countries from the Head Office. 
- 
      
         Video VideoThe Data Protection and Security Challenges in Mergers and AcquisitionsThis panel will explore some of the scenarios where this can occur and discuss why companies are not more aware, the steps they can take to mitigate the situation, the impacts and positive opportunities post-breach. 
- 
      
         Video VideoTransfers Under a Microscope: Impact and Third Country AssessmentsIn this session, we share astep by step guide to undertaking a Transfer Impact Assessment (TIA), the considerations when conducting Third Country Assessments (TCA), and the relevant measures that can be put in place to mitigate risk and ensure regulatory compliance. 
- 
      
         Video VideoUK Data Protection: Working with International Data Transfer Agreements (IDTAs)Join our panel of experts as they explore the new UK rules on international data transfers and clarify the steps organisations should take before transferring personal data out of the UK. 
- 
      
         Video VideoData and Security in Emerging Technologies: The Place of Blockchain Technology in Data ProtectionJoin our panel of blockchain experts as they debate the extent and merits of using blockchain technology for data protection purposes. 
- 
      
         Video VideoTrust and transparency: Why Are Companies Not Learning the Importance of These Things?This panel will explore this question of rebuilding trust, implementing new company-wide policies of trust and transparency, and why this should be prioritised. 
- 
      
         Video VideoDSARs and Data Management: The Importance of a People-Centric ApproachThis panel will discuss best practices, the importance of trust and transparency in process, and how this people-centric approach can be constantly improved. 
- 
      
         Video VideoMake Risk Management SMARTer, Not Harder with a Data-Driven ApproachWe’ll discuss how organizations can take a S.M.A.R.T. approach to connect enterprise data and translate the information into meaningful risk insights 
- 
      
         Video VideoThe Global Cyber-Pandemic; Organisational Cyber-Resilience: Readiness, Details and TacticsThis panel will explore readiness, details and tactics, discussing the five T’s set out by the World Economic Forum: Talent and Planning, Technology and InfoSec governance, Training and communication, Technology tools and Triangulation and continuous improvement. 
 










