All articles by PrivSec Report – Page 5
-
WebinarBuilding an Insider Threat Program for your Organization
Cybersecurity measures are often focused on threats from outside an organization rather than threats posed by individuals inside an organization.
-
WebinarScaling Data Governance in Line with Business Growth
Strong data governance involves getting the right people, processes and technologies in place that are needed to manage and protect the organisations data assets. It forms the basis for effective Legal GRC practices and makes the efficient use of trustworthy data possible.
-
-
NewsCJEU ruling poses threat to UK adequacy decision post-Brexit
The Court of Justice of the European Union (CJEU) yesterday ruled that the scope of European fundamental rights to privacy, data protection and freedom of expression extends to mass data retention and collection for national security purposes.
-
ArticlePolice confirm sex crime victims’ data leaked by Greater Manchester Police in test gone wrong
Highly sensitive data including the names and addresses of thousands of victims was accidentally leaked by Greater Manchester Police (GMP), police confirm.
-
WebinarThe Glass House: anonymity and data exposure in an AI world
All organizations live in a Glass House. From ISP’s to content delivery networks to website advertising, all commercial internet activity is being tracked, collected and monetized by a highly-automated data broker marketplace.
-
ArticleBelgian DPA asks EU court for permission to take regulatory action against Facebook
The Belgian Data Protection Authority (DPA) will be appearing at the Court of Justice of the European Union (CJEU) in Luxemburg today in a bid to gain regulatory action against Facebook.
-
NewsNew mechanism for EU data transfers ‘may be ready by Christmas’
A revised mechanism for transferring EU data outside of the EU may be ready by Christmas, according to the EU’s digital chief.
-
WebinarNavigating Global Privacy Laws Along the IT Asset Lifecycle
As if cyberthreats weren’t enough, consumer privacy laws have put increased pressure on IT leaders to keep personal or sensitive data from being breached. This includes mandates to immediately and thoroughly respond to data deletion requests, data retention expirations, and other cases of no-longer-needed data across your entire data ...
-
WebinarThe Balancing Act: Productivity, Collaboration and Data Protection
Join Microsoft for a deep dive on how you can use intelligent and built-in solutions to identify, label and protect sensitive data without impeding collaboration, even in an environment of remote work. We will follow the journey of an organization as individual workers collaborate on a patent pending project ...
-
FeatureEnsuring security in the journey towards digital healthcare
There are more digital touchpoints in the healthcare systems we experience today than ever before.
-
WebinarSafely Unleash the Value of Sensitive Data in the Cloud
Organizations are leveraging the Cloud to maximise the value of data, consolidating it in data lakes and committing to analytics and machine learning initiatives to convert it into actionable insights. As analysts and data scientists have started working with these tools it has become clear that to provide accurate ...
-
Q&AFacing up to the cyber security challenge
James Eaton-Lee, head of information security and data protection officer at Oxfam, discusses the cyber threats and challenges facing third sector organisations tackling poverty, equality and democratic disempowerment.
-
NewsZerologon vulnerability actively exploited, says Microsoft
Microsoft has observed attacks exploiting the serious security flaw dubbed “Zerologon”, the company’s security intelligence team reported in a tweet yesterday.
-
Q&ADIFC’s data protection landscape: aligning global measures
As the region approaches the end of the DIFC Data Protection Law transition period, PrivSec spoke with Mohammad Khalaf, Senior Regulatory Compliance Officer at Arab Bank in Jordan to discuss the significance of the new law.
-
ebookHow Businesses Can Meet CCPA Compliance Requirements
The California Consumer Privacy Act (CCPA) is a California state statute intended to enhance California residents’ privacy rights.
-
WebinarThe Legal GRC Landscape Today, and Tomorrow
According to Exterro’s recent 2020 Corporate Legal Leaders Survey, 7-in-10 Legal Departments are managing their data related problems by sharing technology to manage litigation, data privacy, compliance, and cybersecurity – all of which represent a new encompassing business landscape of Legal GRC (Governance, Risk and Compliance).
-
FeatureThree things to consider when securing multi-cloud environments
Public sector organisations are all at different points on the cloud transformation and digitalisation journey.
-
WebinarHow to align infosec, data governance and employees to deliver stronger data governance and security
Getting a grip on unstructured data causes headaches because it’s so hard to get visibility of - and you simply can’t secure what you don’t know you’ve got.
-
ebookMid-Year CCPA Trends Report 2020
Now that the July 1st enforcement date for the California Consumer Privacy Act (CCPA) has come and gone, the question on every business’s mind is, “How many Data Subject Requests (DSRs) should I expect to receive?”









