All Sponsored articles
View all stories of the same content type.
-
Sponsored
Defining trust for your organization, as a human trait, and within information security with Matthew Moog from OneTrust
Matthew Moog serves as the General Manager, Third-Party Risk at OneTrust, the category-defining enterprise platform to operationalize trust.
-
Sponsored
OneTrust’s Scott Bridgen tells How Successful Security Teams Manage Risk to Build Trust and Drive Growth
Scott Bridgen serves as Head of GRC at OneTrust, the world’s most widely used privacy, security, and trust technology platform.
-
Sponsored
MOSTLY AI: A security risk too many take: Radioactive test data
The number of applications businesses develop every year is exploding. It’s no longer enough to provide excellent customer service in person. Your customers expect the same and more from your website, from mobile apps to third-party platforms. Digital transformation is a challenge many try to tackle and scale, using stellar tech stacks, state-of-the-art AI, and off-shore development teams. However, the lack of high-quality and privacy-safe test data often hinders both quality results and overall security. Here is what we have found while working with huge enterprises and mid-sized companies globally.
-
Sponsored
An Interview with Linda Thielová, Head of Privacy CoE, DPO at OneTrust
Linda Thielová serves as Head of Privacy CoE, DPO at OneTrust, the world’s most widely used privacy, security, and trust technology platform.
-
Sponsored
Ransomware: when your data backup is your last line of defence, make it count
Not all data backups are created equal.
The cyber-threat landscape is ever evolving, and undoubtedly one of the biggest current threats is ransomware. Ransomware is a type of malicious software that threatens to publish the victim’s data, or perpetually block access to it, unless a ransom is paid. For modern organizations who rely on data to operate and thrive, this kind of attack can be catastrophic. A recent global report from Sophos found that the average cost of paying a ransom was $1.4 million, or $730,000 in equivalent loss of revenue owing to downtime should they choose not to. -
Sponsored
The importance of data protection as a service in the post-pandemic world
Due to the COVID-19 pandemic, over the past 18 months global working habits have changed considerably. With the outbreak in the UK starting at the beginning of 2020, orders to stay at home were given across the country. As businesses rushed to implement strategies that would allow them to continue operations, cloud adoption and remote working accelerated at unprecedented rates.
-
Sponsored
OneTrust GRC - GRC Implementation Steps: Streamline Your IT Risk & Security Management Program
With constantly changing laws, regulations, and limited resources to stay on top of them, information security leaders often find it challenging to scale their risk and compliance programs. Having a clear understanding of “How compliant are we?” is a reoccurring question. However, scoping your compliance obligations is a foundational activity before you can start evaluating risk throughout your organization.
-
Sponsored
OneTrust GRC: Are You Ready for Risk Quantification?
Are you ready for risk quantification? Follow this decision tree to understand if you’re ready for risk quantification today – or if not, what actions can you take to enhance insights today that will support risk quantification in the future!
-
Sponsored
4 Ways to Strengthen Cybersecurity for a Hybrid Workforce
Workplace tech used to be a lot more uniform: When you walked into an office, you likely saw an all-desktop-PC environment with a fairly consistent suite of software and tools, all used within the confines of a single network.
-
Sponsored
Insider Risk Management: Intelligently investigate and take action on insider risks
In this session, you will learn how to leverage Microsoft insider risk management. If you are looking for ways to improve your security and compliance posture, this session is for you!
-
Sponsored
Microsoft Session: Uncover the hidden Insider Risks with Microsoft
In this session, you will learn how to use Insider Risk Management to quickly identify and remediate hidden insider risks within your organization. If you are looking for the latest innovation to manage insider risks without compromising from the trust and efficiency of your teams, this session is for you!
-
Sponsored
Microsoft Session: Manage the retention of content to comply with privacy regulations
Privacy regulations restrict the way companies can use, manage, and retain customer and employee data. How can you ensure you comply with the retention laws around private data? This session will show how Microsoft Information Governance helps to identify and govern customer and employee data automatically.
-
Sponsored
Wrangu: How Privacy by Design is a must in the age of awareness
Public awareness and concern about privacy is at an all-time high and governments are responding with legislation, but quite often the onus has been on individuals to stand up for their rights. Stephen Ragan, Privacy Expert at Wrangu explains how Privacy by Design can help firms navigate the complex landscape.
-
Sponsored
Microsoft: Automating information governance
The challenges around ensuring data is protected and compliance requirements are met have intensified because of the shift to remote working. Atle Skjekkland explains how Microsoft has a solution.
-
Sponsored
Microsoft: Navigating your compliance score in a shifting landscape
How on earth do you begin to get a handle on your compliance performance when the landscape is constantly shifting? Dan Cousineau and Graham Hosking explain how Microsoft Compliance Manager can help.
-
Sponsored
Microsoft: Identifying and managing insider threats
Data breaches due to the behaviour of insiders is of increasing concern globally, but how do you tackle the problem? Neha Monga of Microsoft explains how you can identify and mitigate the risks
-
Sponsored
Data governance is key to automating privacy operations for lower risk and costs (sponsored)
Informatica explains why data privacy governance through metadata-driven intelligence and automation should be a key priority in 2021
-
Sponsored
The importance of training: an interview with Lawpilots CEO Philipp v. Bülow
Remote working, rising cyber-crime and increased data protection regulation mean that it has never been more important to ensure your staff are well-trained. In this Q&A, Philipp v. Bülow of Lawpilots explains what a good training programme should include.
-
Sponsored
Data locality is a compliance control, not a security control
Data locality is increasingly seen as important, but is there confusion as to why it matters? Microsoft’s Mark Anderson explains what he believes to be the real reason for its importance
-
Sponsored
Exterro: From E-Discovery to Privacy, Effectively Manage Risk
Exterro was founded with the simple vision that applying the concepts of process optimization and data science to how companies manage digital information and respond to litigation would drive more successful outcomes at a lower cost.