All Sponsored articles
View all stories of the same content type.
-
Sponsored
Roundtable: TRUST with Data Mesh
Leading data-driven organisations are using data mesh to drive independent, agile and efficient decision-making.
-
Sponsored
Data Protection in Central and Eastern Europe
This report provides an in-depth analysis of enforcement trends across Central and Eastern Europe, focusing on GDPR enforcement in the following countries:
-
Sponsored
Apricorn — Blurred Boundaries: The ‘Consumer’ Scams That Could Be the Next Business Threats
Jon Fielding, Managing Director EMEA, Apricorn
-
Sponsored
LRQA – Enabling Agility in a Time of Change
By bringing together unrivalled expertise in certification, brand assurance, cybersecurity, inspection and training, we’ve become a leading global assurance provider.
-
Sponsored
Exterro – Data Minimisation: A Key Element of Risk-Reduction
The over retention of data is a major data privacy risk that needs to be addressed.
-
Sponsored
Exterro – Data Discovery: Revealing Data Skeletons in Your Closet
The principles of data minimisation and storage limitation aren’t just legal requirements. They’re crucial means of preventing data breaches and GDPR violations.
-
Sponsored
Exterro – Managing a Privacy Program Across Multiple Jurisdictions
Data privacy regulations and practices serve a critical purpose in today’s tech-centric, digitally focused and hyperconnected world.
-
Sponsored
Data Protection in India
This report provides an analysis of data protection and enforcement trends across India.
-
Sponsored
Data Protection In the DACH region
This report provides an analysis of data protection and enforcement trends across the following countries:
-
Sponsored
Defining trust for your organization, as a human trait, and within information security with Matthew Moog from OneTrust
Matthew Moog serves as the General Manager, Third-Party Risk at OneTrust, the category-defining enterprise platform to operationalize trust.
-
Sponsored
OneTrust’s Scott Bridgen tells How Successful Security Teams Manage Risk to Build Trust and Drive Growth
Scott Bridgen serves as Head of GRC at OneTrust, the world’s most widely used privacy, security, and trust technology platform.
-
Sponsored
MOSTLY AI: A security risk too many take: Radioactive test data
The number of applications businesses develop every year is exploding. It’s no longer enough to provide excellent customer service in person. Your customers expect the same and more from your website, from mobile apps to third-party platforms. Digital transformation is a challenge many try to tackle and scale, using stellar tech stacks, state-of-the-art AI, and off-shore development teams. However, the lack of high-quality and privacy-safe test data often hinders both quality results and overall security. Here is what we have found while working with huge enterprises and mid-sized companies globally.
-
Sponsored
An Interview with Linda Thielová, Head of Privacy CoE, DPO at OneTrust
Linda Thielová serves as Head of Privacy CoE, DPO at OneTrust, the world’s most widely used privacy, security, and trust technology platform.
-
Sponsored
Ransomware: when your data backup is your last line of defence, make it count
Not all data backups are created equal.
The cyber-threat landscape is ever evolving, and undoubtedly one of the biggest current threats is ransomware. Ransomware is a type of malicious software that threatens to publish the victim’s data, or perpetually block access to it, unless a ransom is paid. For modern organizations who rely on data to operate and thrive, this kind of attack can be catastrophic. A recent global report from Sophos found that the average cost of paying a ransom was $1.4 million, or $730,000 in equivalent loss of revenue owing to downtime should they choose not to. -
Sponsored
The importance of data protection as a service in the post-pandemic world
Due to the COVID-19 pandemic, over the past 18 months global working habits have changed considerably. With the outbreak in the UK starting at the beginning of 2020, orders to stay at home were given across the country. As businesses rushed to implement strategies that would allow them to continue operations, cloud adoption and remote working accelerated at unprecedented rates.
-
Sponsored
OneTrust GRC - GRC Implementation Steps: Streamline Your IT Risk & Security Management Program
With constantly changing laws, regulations, and limited resources to stay on top of them, information security leaders often find it challenging to scale their risk and compliance programs. Having a clear understanding of “How compliant are we?” is a reoccurring question. However, scoping your compliance obligations is a foundational activity before you can start evaluating risk throughout your organization.
-
Sponsored
OneTrust GRC: Are You Ready for Risk Quantification?
Are you ready for risk quantification? Follow this decision tree to understand if you’re ready for risk quantification today – or if not, what actions can you take to enhance insights today that will support risk quantification in the future!
-
Sponsored
4 Ways to Strengthen Cybersecurity for a Hybrid Workforce
Workplace tech used to be a lot more uniform: When you walked into an office, you likely saw an all-desktop-PC environment with a fairly consistent suite of software and tools, all used within the confines of a single network.
-
Sponsored
Insider Risk Management: Intelligently investigate and take action on insider risks
In this session, you will learn how to leverage Microsoft insider risk management. If you are looking for ways to improve your security and compliance posture, this session is for you!
-
Sponsored
Microsoft Session: Uncover the hidden Insider Risks with Microsoft
In this session, you will learn how to use Insider Risk Management to quickly identify and remediate hidden insider risks within your organization. If you are looking for the latest innovation to manage insider risks without compromising from the trust and efficiency of your teams, this session is for you!