All Webinars articles

  • Exterro 18.03 CPRA webinar

    Data Retention and Records Management Under the CPRA


    While the CCPA doesn’t explicitly address data retention and data minimization practices, California voters chose to expand their rights by passing the California Privacy Rights Act (CPRA) in November of 2020, which fills in those data retention and minimization gaps.

  • 6 Growing Data Risks Legal Departments Must Protect Against in 2021

    6 Growing Data Risks Legal Departments Must Protect Against in 2021


    It’s fair to say that 2020 was a year of disruption. While some of these shifts were fairly predictable (like the launch of the U.S.’s most far-reaching data privacy law to date), more seismic and unforeseen disruptions (a global pandemic and the ensuing rush to work from home) forced abrupt changes in our day-to-day habits and exposed risks in how the General Counsel handles organizational data.

  • OneTrust 26.02  Top Privacy Priorities updated

    Top Privacy Priorities for 2021


    2020 was a whirlwind for privacy — with a pandemic, the invalidation of the EU-U.S. Privacy Shield brought about by the “Schrems II” ruling, and the state of California continues to push privacy regulation to the forefront in the U.S., the importance of data protection continues to grow globally 2021 continues.

  • Exterro 31.03 What the Tech

    Using FTK Imager: The Free Forensic Imaging Tool


    Forensic imaging is essentially a ‘scene of crime’ process for digital information preservation. Decisions made while imaging can affect the entire investigation and could make or break your case. Join Sarah Hargreaves, Director of Training at AccessData - an Exterro Company, for an informative webinar on FTK® Imager, one of the most popular imaging tools on the market.

  • Improving Outcomes with Informatics Powered by Safe Data

    Improving Outcomes with Informatics Powered by Safe Data

    Health organizations are working hard to safely leverage patient data across the care continuum to improve outcomes.

  • Thales 16.03 Agile Crypto

    Agile Crypto and the Quantum Threat

    As the reality of quantum computing approaches, companies and other organizations need to stay one step ahead of the potential computational power that could render today’s encryption algorithms obsolete.

  • Managing Complex DSARs in the Enterprise

    Managing Complex DSARs in the Enterprise

    The number and complexity of Data Subject Access Requests (DSARs) received from both customers and employees has increased over the past couple of years, and some fear Covid-related redundancies will further drive up the numbers.

  • Privitar 23.02 Becoming a data driven bank

    Becoming a Data-Driven Bank with Privacy at the Core

    Leveraging sensitive data to deliver insights and product innovation is more important to running a profitable bank than ever before. This increased demand for sensitive data is creating a strain on existing processes as regulations continue to restrict how and for what personal data can be used.

  • A Day In the Life of Incident and Data Breach_How to Ensure Global Compliance

    A Day In the Life of Incident and Data Breach


    Organizations across the globe have experienced incident and data breaches for the past 10 years. What has changed significantly during this time is the regulatory scrutiny, the public nature of breaches and the emerging private right of action supported by very strong privacy advocacy groups.

  • MostlyAI on-demand

    Can AI solve the Schrems II puzzle?


    What are your options for cross border data-sharing for 2021? Alexandra Ebert, Chief Trust Officer of MOSTLY AI, a synthetic data solution startup, offers a way out of the dilemma with privacy-compliant, accurate synthetic data. 

  • Career Development for Privacy Professionals

    Career Development for Privacy Professionals


    As privacy and data protection roles are becoming more diverse, so is the required skillset from candidates. You’re no longer (necessarily) a DPO with a legal background whose main focus is risk identification in light of regulatory requirements. 

  • Managing Data Retention Strategies Under CPRA

    Managing Data Retention Strategies Under CPRA


    Addressing data retention is the surest way to mitigate risks and costs of a data breach. With CPRA now requiring organizations to provide up-to-date and enforced retention schedules, it’s more important than ever that your organization maintains compliant practices to minimize damages. Understand if your organization is at risk and take action now

  • ManageEngine-08.10-540x360

    Don’t take you eye off insider cybercrime threats. Register for our free webinar


    Cybersecurity measures are often focused on threats from outside an organization rather than threats posed by individuals inside an organization.

  • Lessons Learnt from Recent Data Protection Enforcement Actions

    Lessons Learnt from Recent Data Protection Enforcement Actions


    It has now been over 2 years since GDPR came into effect. As most will now know, these regulations have dramatically increased the onus on organisations to take a proactive approach to data protection compliance and reduce risk around the way they handle data.

  • Data Inventory and Mapping to Operationalize Global Compliance and Risk Management

    Data Inventory and Mapping to Operationalize Global Compliance and Risk Management


    For most Legal Leaders, the biggest challenges they face all have one thing in common: how to defensibly manage their organisation’s data.

  • GDPR Maturity Framework

    The GDPR Maturity Framework That Helps A DPO


    The major challenge with designing, implementing and complying with GDPR legislation is knowing what good looks like; how do you know when you’ve got there? What is best practice?