#RISK Intelligence Archive – Page 76
-
VideoCombatting ransomware with ServiceNow IRM, Security Operations, and Recorded Future
Join us for our webinar, Combatting Ransomware with ServiceNow IRM, Security Operations, and Recorded Future.
-
VideoHow Does ESG Inform ERM?
Our panel will consider how ESG is playing an increasingly vital role in ERM, and how you can integrate environmental, social and governance concerns into your ERM program.
-
VideoBuild Resilience to Minimise Risk
Our first panel will consider the fundamentals of organisational resilience and its relationship to enterprise risk.
-
Q&AMeet the expert: Merilyne Davies among guests at PrivSec: World Forum
Visitors to next month’s PrivSec World Forum can hear the views of data protection senior, Merilyne Davies, we are delighted to announce.
-
NewsPrivSec Focus: Enterprise Risk explores business resilience, risk culture, leadership and much more
Yesterday, PrivSec Focus: Enterprise Risk brought high-level insight into protections that businesses can put in place to guard against ever-changing and unpredictable threats.
-
WebinarAfter the attack: Mitigating Organisational Impact of a Data Breach (DACH region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Video#RISK Founder Nick James in conversation with Annie Machon
Nick James, founder and event director of #RISK talks with Annie Macon, writer and former MI5 intelligence officer.
-
Q&AAn Interview with Holly Butterworth, Regional Vice President Delivery, UK & NA at Camms
Holly Butterworth heads up the Camms Services Delivery team in the UK, Europe and North America, leading software implementations in governance, risk, compliance, project and strategic management.
-
FeatureMeet the expert: Ann McManus among guests at PrivSec: World Forum
Head of Data Protection and Privacy at Lloyds, Ann McManus will join the experts speaking at PrivSec: World Forum.
-
VideoAutomation and AI: Powerful Tools to Help Fight FinCrime
The scale of financial institutions’ AML efforts means automation is now an important tool to help spot and report suspicious transactions.
-
VideoThe comparison between the EU’s July 2021 AML reform proposals and the current US AML regulations
In July 2021, the European Commission proposed a package of reforms to the EU’s anti-money laundering and countering the financing of terrorism (AML/CFT) rules.
-
ReportData Protection in Southern Europe
This report provides analysis of data protection and enforcement trends across the following Southern European countries:
-
Q&AAn Interview with Alecia Futerman Associate Director at Control Risks
Alecia Futerman talks about how she has flourished in the male-dominated world of GRC
-
FeatureApple loses staff over a return to work policy — why the S in ESG matters
Apple, the company that produces technology that makes it easier to work from home, is asking employees to return to the office; and staff are not happy.
-
SponsoredDefining trust for your organization, as a human trait, and within information security with Matthew Moog from OneTrust
Matthew Moog serves as the General Manager, Third-Party Risk at OneTrust, the category-defining enterprise platform to operationalize trust.
-
ArticleThe Splintering of Global Data Flows: Is the ‘Risk-Based Approach’ Dead?
To combat foreign government surveillance, European data protection regulators are taking an increasingly hardline stance on GDPR enforcement that could drastically change the internet. Some argue that a more pragmatic, “risk-based approach” could help avoid severe disruption. But a recent decision against Google suggests those people are losing the debate.
-
NewsThe Internet needs to be more like “Cheers” – we need to know your name
We are used to nobody really knowing who we are on the Internet, but the problem with that is that nobody really knows who we are on the Internet.
-
ebookDragos: 5 Critical Controls For World-Class Ot Cybersecurity
How to Align Your Leadership and Implement a Successful Operational Technology (OT) Security Posture
-
ebookDragos: Pipedream: Chernovite’s Emerging Malware Targeting Industrial Control Systems
This report was proactively written and readied for release as the information became public through other avenues
-
WebinarData Retention - The blind spot in your privacy program (Southern Europe region)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.



