#RISK Intelligence Archive – Page 96
-
NewsMicrosoft Takes Control of Cybercrime Sites Following Court Order
A Virginia court has allowed Microsoft to seize websites operated by Nickel, a Chinese cybercrime group that has been conducting cyberattacks in 29 countries.
-
WebinarCritical Data Collection Methodologies and Use Cases
Each legal case or investigation has its own unique challenges, objectives, and goals. Experts must understand how to work with proven, advanced technologies to deliver a methodical and defensible data collection approach – regardless of whether it’s for a forensic investigation or e-discovery matter.
-
News‘Family Safety’ App Selling Precise Location Data of Millions of Users
Life360, a family safety app, sells information about the whereabouts of millions of its users with “few safeguards to prevent the misuse of this sensitive information,” an investigation by The Markup has revealed.
-
ebookIt’s Time to Take the Ransomware Threat to Business-Critical Applications More Seriously
Almost every day, we see yet another case of ransomware. While, historically, companies of all sizes are targeted, recently it appears that all the news revolves around debilitating attacks on mission-critical or business-critical systems of large enterprises — from fuel and energy companies to food processing companies.
-
NewsIrish Regulator Pushed for ‘Monetisation of Personal Data’ In Data Protection Guidelines, Documents Reveal
The Irish Data Protection Commission (DPC) pushed for a liberal interpretation of data protection law that would favour social media companies, newly-released documents reveal. The proposals were characterised by another regulator as “contrary to everything we believe in” and “(reducing) the GDPR to a pro forma instrument.”
-
-
ebookESG MANAGEMENT ESSENTIALS: Everything You Need to Get Started with ESG
THE ULTIMATE GUIDE TO ESG MANAGEMENT
-
NewsUK Data Regulator Faces Possible Court Challenge Over Age Verification
A coalition of children’s charities has written to the UK’s data protection regulator, the Information Commissioner’s Office (ICO), demanding the mandating of age-checking processes on pornography websites.
-
WebinarThe Art of Innovating Securely in The Cloud
As the threat and regulatory landscape continues to evolve, along with the acceleration in remote working and access to data, how do you protect your most prized assets, whilst growing innovatively and securely, and delivering a seamless customer experience?
-
WebinarEmbracing today’s privacy landscape and leaning into privacy management
We are sharing data more than ever before and while it has simplified day-to-day business, it has also increased considerations for organizations across the globe. Countries are passing regulations with comprehensive privacy requirements and within the next two years, 53% of countries will have GDPR-like regulations.
-
ebookMaximizing the digital opportunity with limitless data governance: Democratize data at scale with Informatica, Snowflake, and Deloitte
As we come out of crisis and into recovery, the economic landscape has been radically transformed. Businesses naturally want to take advantage of the digital opportunity, but they’re learning that the changes underway impact brand and reputation.
-
ebookTrust your data and unleash value: Democratizing data at scale with Informatica, Snowflake, and Deloitte
Every business wants to realise full value from its business data, but a vital ingredient is often missing.
-
NewsRansomware attacks escalate through holiday period, study finds
A new study has identified a 30% leap in the average number of attempted attacks globally over the holiday season.
-
VideoIs Zero Trust Really The Next Big Step in Cybersecurity?
This panel will analyse whether Zero Trust really is an option every Enterprise organisation should consider for greater security and better auditing?
-
VideoWhy the Council of Europe’s Police Surveillance Treaty is a Pernicious Influence on Latam Legal Privacy Frameworks
With panelists from EFF, Latin America and experts in Police Surveillance, this panel will look at why the EFF has made these recommendations and what will happen if no changes are made to this protocol across the region?
-
VideoKeynote: CPO of the Department of Homeland Security in the US, Lynn Dupree
This fireside chat between Lynn and Joel Schwarz will focus on digital identities and how decentralized identifiers can help separate identifiers from authenticators.
-
VideoThe Chain of Trust in the Privacy Supply Chain
This session will discuss how Canadian organizations are reacting to these challenges, and what it means to rise to the privacy challenge for the supply chain.
-
VideoLeading the Change: key attributes for success in continuity & resilience
Building robust compliance, resilience and presilience culture in your organisation What are the key attributes for success and how can they be achieved?
-
VideoSecuring Your Supply Chain; Reducing the Risk of Supply Chain Threats: Cybersecurity Best Practices
This panel will explore cybersecurity best practices from assessing current strategies and third party risk management, through to identification/encryption and zero trust frameworks.
-
VideoLessons learnt from the Pandemic - How do we Enhance our Business Continuity Programmes in 2022?
This session looks at what businesses can do to enhance their business continuity programmes post lockdown and what they can put in place to mitigate any future risk.



