All Webinar articles – Page 3

View all stories of the same content type.

  • Virtru Beyond the Perimeter on demand

    Beyond the Perimeter: A New Data-Centric Model for Breach Preparedness and Rapid Response


    For decades, technology leaders have focused on building a strong perimeter around their networks. But that approach to cybersecurity is no longer sustainable or effective: Globally distributed teams and supply chains have dramatically changed the way organizations create, store, and share data.

  • Informatica APAC time corrected

    Six key steps to operationalizing data privacy governance


    In this webinar, you will be introduced to Informatica’s data governance for privacy model that brings together business and technical policy stakeholders to operationalize data discovery, classification, identity mapping, risk analytics and data protection. 

  • exterro 21.04

    The Crucial Challenges Every Organisation Must Address


    Changing legislation and increased risk from lawsuits from inadequate incident and breach management processes is a challenge for every General Counsel in 2021.

  • HYCU Making the most of multi-cloud ON DEMAND

    Making the most of multi-cloud Backup as a Service: Nine things to consider


    Ask anyone how much they love backup and you get the same response. Laughter. It doesn’t have to be like that, especially if you’re looking for the right solution to handle your on-premises and public cloud IT environments. 

  • OneTrust 20.04 Tracking US Privacy Laws updated speaker

    Tracking US Privacy Laws


    This year, multiple states have introduced, reintroduced, or will make effective new privacy laws. While all eyes have been on the California Consumer Privacy Act (CCPA), there are many other notable federal and state-level laws you should know.

  • Informatica 14.04 Identifying quick wins

    Identifying quick wins to enable data trust from an enterprise data governance program


    The journey to data privacy governance is no easy task, especially when there is no vision of how data trust is connected to your business goals.

  • Egress 09.04 How you can prevent data loss

    How you can prevent data loss and maintain compliance in your email system


    80% of data exists in unstructured format - in the emails, attachments and documents we work with daily. This opens the door to significant risks, particularly as employees use email to send and receive sensitive information.

  • Exterro 07.04 Acc Insight on ACC updated speaker

    Insight on the ACC Chief Legal Officers Report


    The 2021 Chief Legal Officers Survey, undertaken by ACC in partnership with Exterro, builds on responses from 947 CLOs at organisations spanning 21 industries and 44 countries, making it one of the largest and most comprehensive surveys of its kind.

  • Exterro 31.03 What the Tech

    Using FTK Imager: The Free Forensic Imaging Tool


    Forensic imaging is essentially a ‘scene of crime’ process for digital information preservation. Decisions made while imaging can affect the entire investigation and could make or break your case. 

  • OneTrust 30.03 Post Brexit updated speaker

    A Post-Brexit Perspective: Managing Personal Data Breaches


    Brexit will have a profound effect on how UK businesses address their privacy programs. Faced with new challenges for maintaining data transfers across Europe, organizations need a proactive plan in place to manage personal data breaches. Because of this, organizations are asking questions like when can you rely on the one-stop shop mechanism?

  • Exterro 18.03 CPRA

    Data Retention and Records Management Under the CPRA


    While the CCPA doesn’t explicitly address data retention and data minimization practices, California voters chose to expand their rights by passing the California Privacy Rights Act (CPRA) in November of 2020, which fills in those data retention and minimization gaps.

  • Privitar Improving outcomes with informatics ON DEMAND

    Improving Outcomes with Informatics Powered by Safe Data

    Health organizations are working hard to safely leverage patient data across the care continuum to improve outcomes.

  • Thales 16.03 Agile Crypto

    Agile Crypto and the Quantum Threat

    As the reality of quantum computing approaches, companies and other organizations need to stay one step ahead of the potential computational power that could render today’s encryption algorithms obsolete.

  • Webinar Graphics - July 20 onwards (19)

    How to leverage APEC Accountability Agents for your organization’s global privacy and governance


    With data volumes growing across borders and industries, everyone benefits from being able to demonstrate compliance with internationally recognized privacy and security measures.

  • OneTrust 26.02  Top Privacy Priorities updated

    Top Privacy Priorities for 2021


    2020 was a whirlwind for privacy — with a pandemic, the invalidation of the EU-U.S. Privacy Shield brought about by the “Schrems II” ruling, and the state of California continues to push privacy regulation to the forefront in the U.S., the importance of data protection continues to grow globally 2021 continues.

  • Managing Complex DSARs in the Enterprise

    Managing Complex DSARs in the Enterprise

    The number and complexity of Data Subject Access Requests (DSARs) received from both customers and employees has increased over the past couple of years, and some fear Covid-related redundancies will further drive up the numbers.

  • Privitar 23.02 Becoming a data driven bank

    Becoming a Data-Driven Bank with Privacy at the Core

    Leveraging sensitive data to deliver insights and product innovation is more important to running a profitable bank than ever before. This increased demand for sensitive data is creating a strain on existing processes as regulations continue to restrict how and for what personal data can be used.

  • 6 Growing Data Risks Legal Departments Must Protect Against in 2021

    6 Growing Data Risks Legal Departments Must Protect Against in 2021


    It’s fair to say that 2020 was a year of disruption. While some of these shifts were fairly predictable (like the launch of the U.S.’s most far-reaching data privacy law to date), more seismic and unforeseen disruptions (a global pandemic and the ensuing rush to work from home) forced abrupt changes in our day-to-day habits and exposed risks in how the General Counsel handles organizational data.

  • A Day In the Life of Incident and Data Breach_How to Ensure Global Compliance

    A Day In the Life of Incident and Data Breach


    Organizations across the globe have experienced incident and data breaches for the past 10 years. What has changed significantly during this time is the regulatory scrutiny, the public nature of breaches and the emerging private right of action supported by very strong privacy advocacy groups.

  • MostlyAI on-demand

    Can AI solve the Schrems II puzzle?


    What are your options for cross border data-sharing for 2021? Alexandra Ebert, Chief Trust Officer of MOSTLY AI, a synthetic data solution startup, offers a way out of the dilemma with privacy-compliant, accurate synthetic data.