All articles by PrivSec Global – Page 4
- 
      
         Video VideoRisk Assessments of Fast-Tracked Digital Transformation and the Importance of Back-upDigital transformation is happening rapidly, but businesses have to be extra careful not to put their digital assets at risk. 
- 
      
         Video VideoThird Party Risk Management - Ownership and Centralized Risk Assessment ExchangesThird party providers and suppliers sometimes have access to your organisation’s intellectual property, data, financial, and other sensitive information and custom details. Managing this risk can be complex and onerous. 
- 
      
         Video VideoWhy the Future of Trust Must Be Built on Data TransparencyAs organizations invest more in Data Protection & Privacy, and regulators increase their scrutiny, this is a perfect moment in time for increased data transparency. 
- 
      
         Video VideoWhat Happens After Third Party Cookies?The death of the third-party cookie has been widely reported, but what comes next? Rising consumer expectations and changing legislation has meant that the global privacy ecosystem is quickly evolving. 
- 
      
         Video VideoPresident Biden’s Executive Order on Cybersecurity’s Impact to the Software IndustryOn May 12, 2021 U.S. President Joe Biden published a wide-ranging executive order aimed at strengthening the UnitedStates’ cybersecurity. With the backdrop of recent high-profile cyber breaches impacting U.S. companies and critical infrastructure, the executive order is already too late but aims to prevent similar attacks in the future. 
- 
      
         Video VideoTrust: The Children’s Code – Insight and Design at the Heart of ComplianceThe privacy regulators have a message for brands – unless you can prove otherwise, you must assume that children – people under the age of 18 years old – are using your digital products and services. 
- 
      
         Video VideoBusiness Through the Prism of CyberWhen integrating a new technology into your organization, engaging in or trying to mitigate third party risk, one must think of its cyber hygiene. It starts with understanding where your vulnerabilities are, and how you can efficiently manage it 
- 
      
         Video VideoIT vs OT: Is There Too Much Operational Technology Online for Hackers?The attack on the Colonial Pipeline was one of the most major hacks in the history of critical infrastructure. But, this was not a hack on Colonial Pipeline’s IT, but their Operational Technology. The pipeline, which normally carries 2.5m barrels a day, is digital in terms of its operations. 
- 
      
         Video VideoAre you ignoring the elephant in the room - Your Organization’s Data?Everyone is talking about compliance and fines when it comes to an organization’s data. Fines must not be the driving factor to take control of your data. It must start with Trust. 
- 
      
         Video VideoSchrems II and International Data Transfers: The Journey to a new Privacy Shield and Who Is Leading the WayCompanies are still feeling the impact of the European Court of Justice decision last July that torpedoed the Privacy Shield, raising huge question marks about the future of international data transfers between the EU and US. 
- 
      
         Video VideoWomen and Diversity in Cybersecurity: Why Are We Still Having this Conversation?Recent research by Tessian found that a higher proportion of young men were likely to consider a career in cyber security than young women. 
- 
      
         Video VideoEnvironmental, Social, and Corporate Governance: Why a Privacy-Focused Company is a Sustainability-Focused CompanyHolding less data means less storage, less power usage and this is better for the environment. In short, be lean with data, less power, more profit, better for the environment. 
- 
      
         Video VideoRegulatory Developments: POPIA and the Principles of Enforcement ActionSouth Africa’s Protection of Personal Information Act (POPIA) comes into enforcement from 1st July 2021. 
- 
      
         Video VideoThird Party Risk Management under GDPR: Ownership and Risks, Fines and SolutionsData breaches via third parties are a growing problem for GDPR compliance. 
- 
      
         Video VideoData Privacy and Integrated TechnologiesThe rapid development of new technology presents organisations, regulators and society with data privacy and security risks. In our interconnected world, personal data can be shared between devices, networks and borders rapidly. 
- 
      
         Video VideoEffective Zero Trust: How Zero Trust Can Help Secure Your BusinessZero trust can deliver greater security, less demanding workloads, reduced IT complexity and can be used to improve data protection and user experience. 
- 
      
         Video VideoEngaging Your Line of Business for Cybersecurity InitiativesSecurity cannot be done in a silo. The extent and nature of data shared across line of business functions both internally and externally fuels instances of system and organizational vulnerabilities. 
- 
      
         Video VideoGDPR Requirements and Digital TransformationDigital technology is transforming the way businesses operate around the world and data has never been able to be shared so quickly and easily in real time. However, the General Data Protection Regulation requires data usage to be lawful, fair and transparent, with strict requirements to minimise and limit the purpose of data. 
- 
      
         Video VideoHow to Prevent Credential Stuffing Attacks While Managing Risk and TrustCredential stuffing is a brute force attack that can be low-risk, high-reward for cyber criminals. This panel will debate the defence techniques that can be used to guard against this threat. 
- 
      
         Video VideoInternal Threats: Top Threats to your IT Security and how to Address ThemFrom employees accidentally clicking on malicious links, to sabotage, theft of data and unauthorised access, companies have plenty of potential insider cyber security threats to consider. 
 










