#RISK Intelligence Archive – Page 67
-
VideoFinCrime Update: The Complex Web of Financial Crime in Late 2022
This session will bring together financial crime experts to provide an overview of the FinCrime landscape in late 2022.
-
Video5 Ways to Save Time When Assessing Third Parties for Privacy and Security Risks
In this webinar, we’ll discuss how privacy and security teams can save time throughout the third-party risk assessment lifecycle.
-
VideoCyber Threat Landscape: Reviewing 2022 and Looking Ahead to 2023
Despite the huge advancements being made in cyber security, attackers have continued to conduct novel and highly damaging cyberattacks throughout 2022.
-
VideoMeasuring DEI: The Data behind Workplace Diversity
Measuring and reporting diversity, equity and inclusion (DEI) metrics is increasingly crucial for practically every organisation. But the process can be complex and involves highly sensitive data.
-
VideoRisk Resilience and Enterprise Agility: Two Sides of the Same Coin
To succeed in uncertain and unstable times, organisations need to be able to foresee and avoid disruption and also recover from setbacks once they occur.
-
VideoBuilding a Risk-Conscious Culture Among Your Team
Mistakes happen. And, less often, intentional violations among employees happen, too. So much of risk-reduction is about building a risk-consicous culture among your team.
-
VideoThe Role of Privacy and Security in ESG
It’s increasingly clear that people care about the ethical use of their data. This means organisations are starting to see privacy and security as integral to environmental, social and governance issues.
-
VideoBuilding Your Career in Data Protection: How to Overcome Imposter Syndrome
Video: Building Your Career in Data Protection- How to Overcome Imposter Syndrome
-
VideoEnergy Transformation: Preparing for the Journey
Video: Energy Transformation- Preparing for the journey
-
VideoThird-Party Risk Management: Best Practices for Vetting and Monitoring Vendors
Video: Third-Party Risk Management- Best Practices for Vetting and Monitoring Vendors
-
VideoWhat is a B Corp, and Why Do B Corps Matter?
B Corp Certification is an increasingly important way to demonstrate your organisation’s commitment to environmental, social and ethical goals.
-
VideoPrivSec Dublin 2022 highlights
PrivSec Dublin covered the most pressing and challenging topics from across the data protection, privacy and security sectors.
-
ArticleJohn Ackerly of Virtru talks with Nick James
As part of our #RISK In Conersation With series, Virtru CEO and co-founder John Ackerly recently sat down to discuss all things ‘risk’ with event founder Nick James.
-
Video#RISK Founder Nick James in conversation with John Hermans, Wipro
#RISK founder Nick James talks to John Hermans, Head of Europe Cybersecurity & Risk Services at Wipro.
-
Video#RISK Founder Nick James in conversation with John Ackerly, Virtru
Nick James, founder of #RISK, talks to John Ackerly, CEO of Virtru, about the challenges of protecting data in the current risk and compliance landscape.
-
FeatureCyberRes: Privacy begins with data discovery
How to find, protect, and secure your sensitive and high-value data
-
Video#RISK Founder Nick James in conversation with Nina Bryant, FTI Consulting
Nick James, founder and event director of #RISK talks with Nina Bryant, Senior Managing Director at FTI Consulting.
-
FeatureNew NIST Report: Integrating Cybersecurity Into Enterprise Risk Management
With cyberattacks becoming more devastating and complex, cybersecurity is at the forefront of public and government attention.
-
WebinarVendor Due Diligence: Best Practices for Scoping Assessments
With more and more vendors to onboard and monitor post-contract, third-party risk teams can struggleto keep up with the assessment workload. Ultimately, many organizations are asking too manyunnecessary questions or not enough necessary questions.
-
WebinarCybersecurity Threats: Know The Risks Your Third Parties Pose to Your Business and How to Defend Against Them
In 2021 alone there was a 62% global attack spike in ransomware, and it was made clear that the cyber threats are becoming not just more common, but also more sophisticated.



