All Webinar articles – Page 6
-
Webinar
Best Practices for Ongoing Vendor Monitoring
Third-party risk management doesn’t end when you sign the contract to onboard a new vendor or service. As regulations evolve, market conditions change and unforeseen circumstances take effect, it’s important to keep tabs on your vendor population to make sure risk hasn’t creeped back into your organization. Ongoing vendor monitoring is just as critical as pre-contract due diligence, but many organizations struggle to keep pace with a vendor population that only gets larger and larger each year.
-
Webinar
UK Data Protection Index Panel
The UK Data Protection Index is produced by Data Protection World Forum and The DPO Centre.
-
Webinar
Terrorism financing: How to assess, investigate and report on TF risks
In this webinar we will explore the changing nature of terrorism financing and the ways in which violent extremist groups are raising, using and moving their funds.
-
Webinar
(French subtitles) How to build limitless data governance – balancing digital opportunity and business risk
How to build limitless data governance – balancing digital opportunity and business risk | Comment mettre en place une gouvernance des données illimitée - équilibrer les opportunités numériques et les risques commerciaux
-
Webinar
New Dawn in Compliance: Moving Compliance Functions from Defense to Offense
Banks spend 250B USD on AML while only catching 1% of the proceeds from money-laundering which amounts to over 2.5 trillion USD every year. How can we move the needle and help banks protect themselves through the use of technology?
-
Webinar
Confident Breach Readiness: Why Log4j Highlights the Urgency of Data Encryption
As evidenced by the Log4j vulnerability, cyber attacks and data breaches are escalating in frequency, scope, and sophistication. Cyber attacks have now become a guarantee, especially for large organizations. How can enterprise technology leaders remain confident in their security posture when networks and systems are at risk of being compromised?
-
Webinar
The CISOs Role in Driving Trust: Why it Matters, How to Define it, and What Success Looks Like
Watch this session, The CISOs Role in Driving Trust: Why it Matters, How to Define it, and What Success Looks Like with OneTrust’s GRC Offering Lead. Gain insight on why more companies are naming chief trust officers, creating formalized trust initiatives, and measuring trust as a metric for themselves and their business partners.
-
Webinar
Dynamic Data Discovery as the Foundation of your Privacy Program
Data discovery and mapping is the first step towards building an effective privacy program. But traditional data discovery is resource-intensive, static, and incomplete. Modern data discovery tools are rising to these challenges: always-on, secure, and deeply integrated with privacy management software. These advances open up exciting use cases like dynamic ROPAs and DPIAs. With the right approach, you can build efficiency and effectiveness for your legal and data teams.
-
Webinar
How OSINT can be used to investigate environmental crimes
In this webinar, we will shine a spotlight on environmental crime: one of the 22 crimes named in 6AMLD’s expanded list of predicate offences.
-
Webinar
When Good Data Goes Bad: How to Shine a Light on Sensitive, Toxic, and Risky Data
With numerous state-based (California, Virginia, Colorado….) privacy regimes now in place, the mishandling of sensitive data won’t be tolerated – by regulators or consumers. The challenge is: with mounting volumes of user created data under management, most of which is “dark”, how can you protect what you don’t even know you have?
-
Webinar
Operationalizing privacy: A key to legal defensibility for in-house Counsel
There was a time when a successful privacy program could only rely on documentation, checklists, spreadsheets, and emails. However, the complexity of today’s privacy concerns necessitates smarter, faster, and more scalable solutions, and the old programs must become pragmatic.
-
Webinar
Critical Data Collection Methodologies and Use Cases
Each legal case or investigation has its own unique challenges, objectives, and goals. Experts must understand how to work with proven, advanced technologies to deliver a methodical and defensible data collection approach – regardless of whether it’s for a forensic investigation or e-discovery matter.
-
Webinar
The Art of Innovating Securely in The Cloud
As the threat and regulatory landscape continues to evolve, along with the acceleration in remote working and access to data, how do you protect your most prized assets, whilst growing innovatively and securely, and delivering a seamless customer experience?
-
Webinar
Embracing today’s privacy landscape and leaning into privacy management
We are sharing data more than ever before and while it has simplified day-to-day business, it has also increased considerations for organizations across the globe. Countries are passing regulations with comprehensive privacy requirements and within the next two years, 53% of countries will have GDPR-like regulations.
-
Webinar
Why your law firm needs to layer your email security in Microsoft 365 for maximum protection
Risks to your law firms’ email security have never been greater. With remote work still as popular as ever and an explosion in digital transformation projects, there is an increase in the risks of outbound data loss. In fact, we know that 85% of law firms using Microsoft 365 had an email data breach in the last 12 months.
-
Webinar
Data Awareness to Data Intelligence: Leveraging the power of automation
The increasing number and complexity of privacy laws, like the upcoming California Privacy Rights Act, as well as the continued emergence of good privacy practices and compliant data use as a competitive differentiator have been the driving force for organizations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Webinar
Not All Assurances are Created Equal – Assessed Entities and Relying Parties Beware!
With the cyber threat landscape constantly evolving, and the number and complexity of business-vendor relationships continuously growing, there is an increasing market need for reliable assurances.
-
Webinar
The Future of Anti-Financial Crime? Enhancing Effectiveness with the Investigator-Centric Approach
In this webinar we will discuss how FIs can apply innovative approaches developed for national security and law enforcement agencies to enhance the efficiency and effectiveness of their anti-financial crime controls.
-
Webinar
2022 Trend Watch: Realizing the Full Potential of SASE and Zero Trust
The events of 2021 have created a paradigm shift in cybersecurity. The steady cadence of large-scale cyber attacks have accelerated a move away from perimeter-focused security to Zero Trust. While core foundations of Zero Trust have been implemented, many tech leaders are still missing a critical piece of the puzzle for safeguarding their data.
-
Webinar
Achieving Full Privacy Compliance: After Cookie Consent, What’s Next?
Today, implementing a cookie consent solution is a significant first step to adhere to privacy regulations such as GDPR and PIPL.