All Webinar articles – Page 2
View all stories of the same content type.
-
Webinar
Wait a minute, whose data is that?! Uncovering your biggest data governance, security and privacy risks
In order to establish effective governance, privacy, or security programs, you first need to truly understand your data. What data do you store? Who owns it? Where is it located? Who has access to it? What regulations apply to it? Can you quickly and easily respond to data requests? Without a robust data inventory and understanding these types of questions, there is a limited chance of success achieving any Legal GRC objective.
-
Webinar
Investigating illicit trade: The importance of technology and Open Source Intelligence
Illicit trade is a popular vector for sophisticated transnational organised crime groups (OCGs) due to its relatively low risk and high reward nature. By leveraging modern technologies and exploiting the increasingly frictionless structures of globalised trade OCGs are profiting handsomely.
-
Webinar
Privacy Management: The Data-Driven approach to managing risk and automating compliance
Data privacy regulations are becoming more stringent in terms of how data needs to be managed for compliance.
-
Webinar
GDPR enforcement trends – lessons from 2021
2021 was a landslide year for GDPR enforcement – but what’s actually changed for privacy teams and how they should prioritise?
-
Webinar
Best Practices for Ongoing Vendor Monitoring
Third-party risk management doesn’t end when you sign the contract to onboard a new vendor or service. As regulations evolve, market conditions change and unforeseen circumstances take effect, it’s important to keep tabs on your vendor population to make sure risk hasn’t creeped back into your organization. Ongoing vendor monitoring is just as critical as pre-contract due diligence, but many organizations struggle to keep pace with a vendor population that only gets larger and larger each year.
-
Webinar
UK Data Protection Index Panel
The UK Data Protection Index is produced by Data Protection World Forum and The DPO Centre.
-
Webinar
Terrorism financing: How to assess, investigate and report on TF risks
In this webinar we will explore the changing nature of terrorism financing and the ways in which violent extremist groups are raising, using and moving their funds.
-
Webinar
(French subtitles) How to build limitless data governance – balancing digital opportunity and business risk
How to build limitless data governance – balancing digital opportunity and business risk | Comment mettre en place une gouvernance des données illimitée - équilibrer les opportunités numériques et les risques commerciaux
-
Webinar
New Dawn in Compliance: Moving Compliance Functions from Defense to Offense
Banks spend 250B USD on AML while only catching 1% of the proceeds from money-laundering which amounts to over 2.5 trillion USD every year. How can we move the needle and help banks protect themselves through the use of technology?
-
Webinar
Confident Breach Readiness: Why Log4j Highlights the Urgency of Data Encryption
As evidenced by the Log4j vulnerability, cyber attacks and data breaches are escalating in frequency, scope, and sophistication. Cyber attacks have now become a guarantee, especially for large organizations. How can enterprise technology leaders remain confident in their security posture when networks and systems are at risk of being compromised?
-
Webinar
The CISOs Role in Driving Trust: Why it Matters, How to Define it, and What Success Looks Like
Watch this session, The CISOs Role in Driving Trust: Why it Matters, How to Define it, and What Success Looks Like with OneTrust’s GRC Offering Lead. Gain insight on why more companies are naming chief trust officers, creating formalized trust initiatives, and measuring trust as a metric for themselves and their business partners.
-
Webinar
Dynamic Data Discovery as the Foundation of your Privacy Program
Data discovery and mapping is the first step towards building an effective privacy program. But traditional data discovery is resource-intensive, static, and incomplete. Modern data discovery tools are rising to these challenges: always-on, secure, and deeply integrated with privacy management software. These advances open up exciting use cases like dynamic ROPAs and DPIAs. With the right approach, you can build efficiency and effectiveness for your legal and data teams.
-
Webinar
How OSINT can be used to investigate environmental crimes
In this webinar, we will shine a spotlight on environmental crime: one of the 22 crimes named in 6AMLD’s expanded list of predicate offences.
-
Webinar
When Good Data Goes Bad: How to Shine a Light on Sensitive, Toxic, and Risky Data
With numerous state-based (California, Virginia, Colorado….) privacy regimes now in place, the mishandling of sensitive data won’t be tolerated – by regulators or consumers. The challenge is: with mounting volumes of user created data under management, most of which is “dark”, how can you protect what you don’t even know you have?
-
Webinar
Operationalizing privacy: A key to legal defensibility for in-house Counsel
There was a time when a successful privacy program could only rely on documentation, checklists, spreadsheets, and emails. However, the complexity of today’s privacy concerns necessitates smarter, faster, and more scalable solutions, and the old programs must become pragmatic.
-
Webinar
Critical Data Collection Methodologies and Use Cases
Each legal case or investigation has its own unique challenges, objectives, and goals. Experts must understand how to work with proven, advanced technologies to deliver a methodical and defensible data collection approach – regardless of whether it’s for a forensic investigation or e-discovery matter.
-
Webinar
The Art of Innovating Securely in The Cloud
As the threat and regulatory landscape continues to evolve, along with the acceleration in remote working and access to data, how do you protect your most prized assets, whilst growing innovatively and securely, and delivering a seamless customer experience?
-
Webinar
Embracing today’s privacy landscape and leaning into privacy management
We are sharing data more than ever before and while it has simplified day-to-day business, it has also increased considerations for organizations across the globe. Countries are passing regulations with comprehensive privacy requirements and within the next two years, 53% of countries will have GDPR-like regulations.
-
Webinar
Why your law firm needs to layer your email security in Microsoft 365 for maximum protection
Risks to your law firms’ email security have never been greater. With remote work still as popular as ever and an explosion in digital transformation projects, there is an increase in the risks of outbound data loss. In fact, we know that 85% of law firms using Microsoft 365 had an email data breach in the last 12 months.
-
Webinar
Data Awareness to Data Intelligence: Leveraging the power of automation
The increasing number and complexity of privacy laws, like the upcoming California Privacy Rights Act, as well as the continued emergence of good privacy practices and compliant data use as a competitive differentiator have been the driving force for organizations to shift focus from tick-the-box compliance exercises to automated privacy solutions.