All Video articles – Page 11
-
Video
How Compliance Helps Build a Strong and Resilient Business
This session will help you gain a better understanding of how compliance helps build a strong and resilient business—and deliver the knowledge and tools you need to better integrate compliance into your organisation’s business strategy.
-
Video
Keeping pace with cybersecurity by scaling IT governance and data risk management
Video: Keeping pace with cybersecurity by scaling IT governance and data risk management
-
Video
The Future of Cybersecurity Law and Regulation: Emerging Trends and Challenges
This session will help you better understand the present and future legal landscape in cybersecurity so you can prepare and help balance your organisation’s resources and priorities.
-
Video
Managing Cross-Border Financial Crime and Anti-Money Laundering Risks
This session will help you gain a better understanding of the risks and opportunities of managing cross-border financial crime and AML risks and will provide the knowledge and tools you need to manage these risks in your own organisation.
-
Video
The Role of AI in Cybersecurity: Opportunities and Challenges
The session will provide practical advice on how to leverage the power of AI to improve your organisation’s cyber defences.
-
Video
GDPR Reform, Online Safety, Light-Touch AI Regulation: Making Sense of the UK Legal Environment
This session will help you make sense of the UK’s current legal landscape, with tech policy and data protection experts providing a comprehensive update of the various bills, frameworks and legal amendments likely to arise in the coming years.
-
Video
The Future of Privacy: What to Expect in 2023 and Beyond
In this roundtable discussion, data protection experts will come together to discuss the future of privacy, focusing on upcoming developments in privacy laws and technologies, and helping you understand how your organisation can prepare for these changes.
-
Video
Privacy, Security and Digital Policy Update: UK [Sponsored by OneTrust]
The UK government repeatedly namechecks data protection as one area in which the country could capitalise on its departure from the EU. But opinions vary as to whether the reform proposals will be effective or meaningful.
-
Video
How to measure the effectiveness of your privacy program [Sponsored by Privacy Culture]
It is crucial to have an effective privacy program in place that can ensure compliance with regulations, manage privacy risks, and build trust with customers and stakeholders. After 5 years of GDPR, measuring the effectiveness of your privacy program continues to be a complex and challenging task as privacy professionals argue that they face various challenges when it comes to measuring privacy effectiveness.
-
Video
Subject Access Requests: Respecting Data Rights While Saving Time and Resources [Sponsored by Zivver & OneTrust]
This session will focus on creating a streamlined approach to data governance that allows for timely and comprehensive responses to subject access requests.
-
Video
#RISK Founder Nick James in conversation with Stephen Boyer, BitSight
In this interview, Nick James, #RISK Founder talks to Stephen Boyer, CTO & Co-Founder of BitSight. Nick and Stephen discuss the evolution of cyber risk over the past two decades, the awareness of cybersecurity among board members, and how to fight the ransomware epidemic.
-
Video
Leveraging Data in your Ethics and Compliance Programs
Ethics and compliance programs have more data available to them than ever before. Capturing data on program activity and impact can be a powerful tool to assess whether your ethics and compliance program works in practice. Many companies also find value in benchmarking their programs against industry norms and in response to risks. That said, data’s nascency in the ethics and compliance space means we are still struggling to understand what to do with all this data, and how to know what it is telling us.
-
Video
Children’s Privacy: Steps Towards a Less Data-Hungry Web for Kids
Regulators worldwide are getting serious about children’s privacy. From the “children’s codes” established in jurisdictions like the UK and Califorina, to the recent enforcement action against Instagram and TikTok—it’s becoming increasingly clear that the web is likely to change so that children are better protected.
-
Video
Privacy Risk Assessments in the US: Why, When, and What?
A standard practice from other global privacy laws has hit the US: privacy risk or data protection assessments (commonly known as PIAs) are now required under certain criteria for the processing of personal data in all new state laws, except Utah. Beyond regulatory compliance, a comprehensive and integrated assessment program embeds privacy by design into your organization’s data strategy and enables you to manage risk at scale.
-
Video
PICCASO In Conversation with James Leaton Gray, The Privacy Practice
Nick James speakers with James Leaton Gray, The Privacy Practice, who has been shortlisted at the Picasso Privacy Awards gala final, taking place on the 8th December at the Grosvenor House Hotel in London.
-
Video
PICCASO: Nick James in conversation with Janine McKelvey, General Counsel - Data, BT Group Data Privacy & Ethics Officer
Nick James speakers with Janine McKelvey, BT Group, who has been shortlisted for the outstanding DPO award at the Picasso Privacy Awards gala final, taking place on the 8th December at the Grosvenor House Hotel in London.
-
Video
Should Data Protection Experts Also Be AI Experts?
AI is advancing fast, and playing an increasingly important role in many organisations’ operations and business models.
-
Video
Insider Threats and Accidental Disclosure: The Biggest Causes of Data Breaches?
Much of the work of security professionals focuses on securing an organisation’s perimeter and keeping malicious actors out. But one of the most significant threats to privacy and security is accidental disclosure of data by employees.
-
Video
OT and IT: Differences, Controls, and Key Integration Points
We all know IT - the laptops, phones, applications, and cloud applications we use at work and home, that manage information. Systems that run industrial systems – electric utilities, gas pipelines, water systems, and manufacturing plants – are Operational Technology (OT).
-
Video
Unifying Privacy Management and Information Security Compliance: Building a Bridge to Improved Efficiency
The work of privacy and security professionals looks quite different day-to-day. But these two disciplines share a lot in common, and there are areas where working in silos does not best serve the interests of employees, organisations or even users.