All Video articles – Page 4
-
Video
Safeguarding Your Assets: How To Implement a Robust Physical Security Risk Management Program
Join Mark Barwood, Business Development Manager at Acuity Risk Management, for an engaging presentation on implementing a robust physical security risk management program. Mark has extensive first-hand experience as a Risk Management and Security professional working in various industries and organisation types, including law enforcement and media broadcasting.
-
Video
Preparing for the Future of Data and Digital: Anticipating Upcoming EU Law
Participants will come away with a better understanding of the upcoming EU laws related to data and digital and how they can prepare for the changes ahead.
-
Video
Transparency vs Privacy in the Fight Against Financial Crime
To spot fraud and money laundering, you need a clearer picture of how people use money. But excessive data collection can interfere with people’s fundamental rights. This panel will discuss striking the right balance between transparency and privacy in the context of financial crime prevention.
-
Video
Identity and Access Management in Remote Work: Addressing Security Challenges and Ensuring Compliance
With more and more employees working remotely, the risk of identity theft, phishing attacks, and unauthorized access to sensitive data increases.
-
Video
From Incidents to Insights: Transforming Risk Management with Incident Tracking
Does your risk program lack substance? Are your executive stakeholders asking for quantifiable data to substantiate your risk program?
-
Video
Compliance as a Competitive Advantage
In this session, panellists will share their experiences and best practices for using compliance as a way to differentiate their business from competitors, build customer trust, and increase operational efficiency.
-
Video
EU-US Data Transfers: Time to Relax?
Replacing Privacy Shield has been a long and complicated process, apparently accelerated by the war in Ukraine and several concessions from the negotiators.
-
Video
What’s Wrong With the GDPR?
The EU’s best-known regulation is not without its critics. Some argue that the law hampers innovation and imposes unnecessary costs. Others claim that the GDPR’s only problem is that regulators don’t go far enough in enforcing the law.
-
Video
Should You Trust the EU-US Data Privacy Framework?
The EU-US data transfer problem remains unsolved after another year of GDPR enforcement. But is the light at the end of the tunnel with the EU-US Data Privacy Framework? Or will the adequacy decision go the same way as its two predecessors?
-
Video
Beyond Europe: How the GDPR Is Shaping Data Protection Globally
Jurisdictions worldwide are improving their data protection frameworks—sometimes in the hope of obtaining EU adequacy, sometimes because the public demands them to do so. From definitions and principles to data subject rights, the influence of the GDPR is clear.
-
Video
Staying Compliant: How to manage data transfers around the globe
Join this session as we explore:
-
Video
The GDPR’s ‘Risk-Based Approach’: How It Works and When to Use It
The GDPR recognises a “risk-based approach” in several areas of data protection compliance. Controllers can adjust some data protection and security practices, taking into account factors such as the nature of the data, the resources of the organisation, and the “state of the art”.
-
Video
Can the GDPR and Widespread AI Co-Exist?
In this session, panellists will explore AI’s many potential GDPR pitfalls and address the “elephant in the room”: Is the AI industry fundamentally incompatible with a robust data protection regime?
-
Video
Enforcement Highlights From the GDPR’s Fourth Year
In this session, our panel will explore the most significant enforcement actions since the GDPR’s last birthday and consider their impact on all organisations.
-
Video
Internet Intelligence for Better Exposure Management and Threat Hunting
Today’s security teams’ task lists are becoming more and more complex. To deal with a rapidly-growing threat environment and increasingly sophisticated bad actors, security teams are managing multiple tools that don’t provide a needed outside-in perspective.
-
Video
Fight Fire With Fire: Artificial Intelligence for Red Teams and Blue Teams
This session will explore how AI is changing the threat landscape—and how to leverage AI to defend your organisation.
-
Video
Is the GDPR’s ‘One-Stop-Shop’ Working?
One common criticism of the GDPR is that its enforcement process is not sufficiently effective. Critics argue that routing cross-border decisions through a controller’s “main establishment” has led to delays and created an enforcement gap.
-
Video
Ransomware: Should You Ever Pay? Preparing for the Worst
Research suggests that most organisations hit with a ransomware attack end up paying the ransom. Perhaps this is understandable—but is it the right decision? And can paying a ransom to cybercriminals actually be illegal in some circumstances?
-
Video
Preventing Insider Threats Without Compromising Workflow [Sponsored by Zivver]
Insider threats, whether through error or malicious action, still account for a large proportion of data breaches. But monitoring and trying to control the actions of your employees is fraught with issues.
-
Video
What Is ‘Necessary’ for a Contract? GDPR Legal Bases Following the Meta Decisions
The Irish Data Protection Commission (DPC)’s decisions against Facebook, Instagram and WhatsApp are some of the most significant developments in data protection since the passing of the GDPR.