All Video articles – Page 15
-
Video
#RISK Founder Nick James in conversation with John Ackerly, Virtru
Nick James, founder of #RISK, talks to John Ackerly, CEO of Virtru, about the challenges of protecting data in the current risk and compliance landscape.
-
Video
#RISK Founder Nick James in conversation with Nina Bryant, FTI Consulting
Nick James, founder and event director of #RISK talks with Nina Bryant, Senior Managing Director at FTI Consulting.
-
Video
#RISK Founder Nick James in conversation with Rick Goud, Zivver
Nick James, founder and event director of #RISK talks with Rick Goud, CIO & Founder of Zivver.
-
Video
The GRC Red Flag Series: G(P)RC - How GRC Drives Performance in Banking & Finance
Access the on-demand video for The GRC Red Flag Series with Michael Rasmussen: G(P)RC - How GRC Drives Performance in Banking & Finance
-
Video
#RISK Founder Nick James in conversation with Vivek Dodd, Skillcast
Nick James, founder and event director of #RISK talks with Vivek Dodd, CEO of Skillcast.
-
Video
#RISK Founder Nick James in conversation with Paul Butcher LRQA
Nick James, founder and event director of #RISK talks with Paul Butcher, risk professional and CEO of LRQA.
-
Video
#RISK Founder Nick James in conversation with Rory Stewart
Nick James, founder and event director of #RISK talks with academic, politician, and diplomat Rory Stewart.
-
Video
#RISK Founder Nick James in conversation with Matt Kunkel
Nick James, founder and event director of #RISK talks with LogicGate CEO Matt Kunkel.
-
Video
#RISK Founder Nick James in conversation with Gareth Tranter
Nick James, founder and event director of #RISK talks with Customer Success expert Gareth Tranter.
-
Video
Best Practices for Detecting, Preventing and Recovering From Ransomware
Ransomware continues to cause huge losses and harms across the globe. But taking a proactive approach to security and business continuity can reduce the likelihood of falling victim to an attack—and reduce the damage that occurs if you are targeted.
-
Video
Exploring the Updates to ISO/IEC 27001
This panel will explore the updates to the ISO/IEC 27001 framework—what’s new? What stays the same? And what do organisations need to do to maintain compliance with the new version?
-
Video
The Dangers of AI-Driven Mass Surveillance
Artificial intelligence is driving huge improvements in fields as diverse as medicine and climate monitoring. But from biometric identification to “social credit” scoring systems, AI is also providing new ways for governments and large corporations to track and surveil people—with significant implications for their privacy and freedom.
-
Video
Can Privacy Enhancing Technologies (PETs) Solve the Data Transfer Puzzle?
The legal issues around data transfers continue to cause confusion and consume resources. Many believe the solution lies in Privacy Enhancing Technologies (PETs). The US and UK governments are even collaborating on an “innovation prize challenge” to encourage the development of PETs for data transfers.
-
Video
Beyond the US: A Look At Transfers to Other Third Countries
The focus on data transfers post-Schrems II has been squarely on the US. But the same rules apply to any third country without an adequacy decision.
-
Video
Data Protection Update: United Kingdom
The UK is set to overhaul its data protection and privacy rules, with changes to cookies, accountability and regulation all on the table.
-
Video
Insider Threats: Detecting and Mitigating the Threat From Within
Insider threats can lead to devastating security incidents—whether intentional or negligent, and perpetrated by a from a trusted employee, ex-employee, or contractor.
-
Video
Data Protection Update: United States
Connecticut and Utah joined the ranks of US states with a comprehensive privacy law this year. The privacy patchwork continues to stitch itself together—but how should privacy professionals respond. And is anyone still hoping for a federal privacy law?
-
Video
How to Manage Third-Party Risk in Your Supply Chain
Supply chain risks take many forms and can be devastating to your organisation if not properly mitigated. From cybersecurity to reputational and legal issues, managing risk among your vendors and other third parties can be a daunting task.
-
Video
Keeping Pace with Emerging Threats
Cyber criminals are leveraging innovative techniques and taking advantage of new security vulnerabilities. Organizations must evolve and adapt their defenses to protect against the next wave of cybersecurity threats.
-
Video
Secure SAP Development at the Speed of Digital Transformation
SAP applications are the cornerstone of business operations and have become a top attack vector for enterprises.The need for secure development and testing of applications have never been greater. Yet there is a lack of tools that sufficiently support SAP languages, components, and development environments, resulting in the use of manual code reviews which are error prone.