All Risk articles – Page 2
-
Webinar
Terrorism financing: How to assess, investigate and report on TF risks
In this webinar we will explore the changing nature of terrorism financing and the ways in which violent extremist groups are raising, using and moving their funds.
-
ebook
ESG MANAGEMENT ESSENTIALS: Everything You Need to Get Started with ESG
THE ULTIMATE GUIDE TO ESG MANAGEMENT
-
ebook
Trust your data and unleash value: Democratizing data at scale with Informatica, Snowflake, and Deloitte
Every business wants to realise full value from its business data, but a vital ingredient is often missing.
-
Webinar
Data Awareness to Data Intelligence: Leveraging the power of automation
The increasing number and complexity of privacy laws, like the upcoming California Privacy Rights Act, as well as the continued emergence of good privacy practices and compliant data use as a competitive differentiator have been the driving force for organizations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Webinar
Third-Party Risk Management: Best Practices for an Effective and Efficient Program
Your organization likely has some means for managing third-party risk, but you probably suspect that there remain untapped opportunities to incrementally improve your program.
-
Webinar
How to build limitless data governance – balancing digital opportunity and business risk
Post-pandemic, establishing and maintaining trust will be an important differentiator for employees, customers, and partners.
-
Webinar
Managing Data Processors and Complying with the GDPR
Join us on this webinar replay to hear expert views and perspectives on what the GDPR says around data processors and to take a holistic view on the risks associated with non-compliance.
-
Podcast
Microsoft Podcast: Manage risk with intelligent data protection and compliance solutions
During this podcast, our subject matter experts will discuss the biggest concerns for today’s CIOs, CISOs and DPOs and they will explore the best ways to protect data, mitigate risk, and address compliance regulations in this new reality.
-
Sponsored
OneTrust GRC - GRC Implementation Steps: Streamline Your IT Risk & Security Management Program
With constantly changing laws, regulations, and limited resources to stay on top of them, information security leaders often find it challenging to scale their risk and compliance programs. Having a clear understanding of “How compliant are we?” is a reoccurring question. However, scoping your compliance obligations is a foundational activity before you can start evaluating risk throughout your organization.
-
ebook
OneTrust GRC: Steering Your IT Risk Management Program
Cybersecurity in line with IT risk management is important for both your internal and external GRC execution. Forrester, a world-wide research and advisory firm, recently surveyed CEO’s to produce a new report, The Biggest Trends Shaping Enterprise Risk Management.
-
Webinar
OneTrust GRC: Building a GRC Program That Fits Your Business | A First Line Friendly ISMS Suite
How much time do you spend transferring data across systems to execute your GRC program? Oftentimes, disparate systems across policy, privacy, IT risk, vendor risk, incident, and audit result in duplicated data across applications.
-
Sponsored
OneTrust GRC: Are You Ready for Risk Quantification?
Are you ready for risk quantification? Follow this decision tree to understand if you’re ready for risk quantification today – or if not, what actions can you take to enhance insights today that will support risk quantification in the future!
-
Webinar
GRC in 2021 - Demonstrate Value Fast with your Program
Today’s distributed, dynamic, and disrupted business has to navigate the velocity of risks which demands agility, resilience, and integrity.
-
Webinar
Legal Governance, Risk and Compliance (Legal GRC) by Design
Organisations need an integrated strategy, process, information, and technology architecture to govern legal, meet legal commitments, and manage legal uncertainty and risk in a way that is efficient, effective, and agile.
-
News
Business Update: Qualys Introduces CyberSecurity Asset Management
New asset inventory app helps security teams identify and respond to gaps in their security and compliance program (Press Release)
-
News
Business Update: Vulcan Cyber Research Reveals Most Enterprise Cyber Security Teams Lack the Ability to Remediate Risk
Benchmark study finds most cyber security organizations lack the tooling and resources to deliver enterprise cyber hygiene (Press Release)
-
News
Business Update: Digital Shadows announces new threat intelligence capabilities
By integrating with MITRE ATT&CK®, Digital Shadows customers will benefit from the collective insight of thousands of security professionals worldwide (Press Release)
-
News
Business Update: Data443 Risk Mitigation acquires ArcMail
Data443 Risk Mitigation, Inc., a leading data security and privacy software company, has announced that it has acquired all rights to the data archiving platform ArcMail, representing its first acquisition of 2021. This follows a two-year exclusive license agreement with ArcMail that was previously announced on February 11, 2019. (press release)
-
Video
Protecting Data and Ensuring Compliance Posture in the Hybrid Work Environment
We have seen two years’ worth of digital transformation in only a few months. Most of Microsoft’s enterprise customers (and even Microsoft itself!) had to quickly transform the way they assess new and complex risks in the wake of remote work.
-
Video
To Trust, or Not to Trust the Cloud That is Your Compliance and Risk Question
Many organizations struggle with digital transformation and cloud computing, particularly when implementing a framework to meet their compliance requirements.
- Previous Page
- Page1
- Page2
- Page3
- Next Page