All Webinars articles – Page 2
-
WebinarData Retention - The blind spot in your privacy program (DACH region)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
WebinarAfter the attack: Mitigating Organisational Impact of a Data Breach (DACH region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
WebinarData Retention - The blind spot in your privacy program (Southern Europe region)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
WebinarData Awareness to Data Intelligence: Leveraging the power of automation (LATAM Region)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
WebinarSaaS innovation & data exposure, the shocking truth about your cloud innovation tools
The last 18 months have caused many organisations to re-examine their data security processes and policies. Cloud services are now likely to form a critical part of your operations, with many CISO’s looking out for the next Solar Winds or Log4J that has the potential to compromise their data. Our annual data risk report and latest research carried out by Forrester, unearthed some shocking truths about the state of SaaS data protection in Europe.
-
WebinarData Control: How IT and Security leaders are driving innovation in data privacy and governance
Data privacy isn’t just a challenge for your Legal team. IT and Security leaders are spearheading innovation: elevating data control as the key to scalable and future proof privacy compliance, providing the platform to manage risk, and collaborating with marketing and data teams to ensure data supports growth initiatives.
-
WebinarAfter the attack: There’s No Place for Guesswork in Cyber Attack Investigations (On-Demand)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
WebinarWait a minute, whose data is that?! Uncovering your biggest data governance, security and privacy risks
In order to establish effective governance, privacy, or security programs, you first need to truly understand your data. What data do you store? Who owns it? Where is it located? Who has access to it? What regulations apply to it? Can you quickly and easily respond to data requests? Without a robust data inventory and understanding these types of questions, there is a limited chance of success achieving any Legal GRC objective.
-
WebinarInvestigating illicit trade: The importance of technology and Open Source Intelligence
Illicit trade is a popular vector for sophisticated transnational organised crime groups (OCGs) due to its relatively low risk and high reward nature. By leveraging modern technologies and exploiting the increasingly frictionless structures of globalised trade OCGs are profiting handsomely.
-
WebinarPrivacy Management: The Data-Driven approach to managing risk and automating compliance
Data privacy regulations are becoming more stringent in terms of how data needs to be managed for compliance.
-
WebinarGDPR enforcement trends – lessons from 2021
2021 was a landslide year for GDPR enforcement – but what’s actually changed for privacy teams and how they should prioritise?
-
WebinarBest Practices for Ongoing Vendor Monitoring
Third-party risk management doesn’t end when you sign the contract to onboard a new vendor or service. As regulations evolve, market conditions change and unforeseen circumstances take effect, it’s important to keep tabs on your vendor population to make sure risk hasn’t creeped back into your organization. Ongoing vendor monitoring is just as critical as pre-contract due diligence, but many organizations struggle to keep pace with a vendor population that only gets larger and larger each year.
-
WebinarUK Data Protection Index Panel
The UK Data Protection Index is produced by Data Protection World Forum and The DPO Centre.
-
WebinarTerrorism financing: How to assess, investigate and report on TF risks
In this webinar we will explore the changing nature of terrorism financing and the ways in which violent extremist groups are raising, using and moving their funds.
-
Webinar(French subtitles) How to build limitless data governance – balancing digital opportunity and business risk
How to build limitless data governance – balancing digital opportunity and business risk | Comment mettre en place une gouvernance des données illimitée - équilibrer les opportunités numériques et les risques commerciaux
-
WebinarDynamic Data Discovery as the Foundation of your Privacy Program
Data discovery and mapping is the first step towards building an effective privacy program. But traditional data discovery is resource-intensive, static, and incomplete. Modern data discovery tools are rising to these challenges: always-on, secure, and deeply integrated with privacy management software. These advances open up exciting use cases like dynamic ROPAs and DPIAs. With the right approach, you can build efficiency and effectiveness for your legal and data teams.
-
WebinarWhen Good Data Goes Bad: How to Shine a Light on Sensitive, Toxic, and Risky Data
With numerous state-based (California, Virginia, Colorado….) privacy regimes now in place, the mishandling of sensitive data won’t be tolerated – by regulators or consumers. The challenge is: with mounting volumes of user created data under management, most of which is “dark”, how can you protect what you don’t even know you have?
-
WebinarOperationalizing privacy: A key to legal defensibility for in-house Counsel
There was a time when a successful privacy program could only rely on documentation, checklists, spreadsheets, and emails. However, the complexity of today’s privacy concerns necessitates smarter, faster, and more scalable solutions, and the old programs must become pragmatic.
-
WebinarThe Art of Innovating Securely in The Cloud
As the threat and regulatory landscape continues to evolve, along with the acceleration in remote working and access to data, how do you protect your most prized assets, whilst growing innovatively and securely, and delivering a seamless customer experience?
-
WebinarWhy your law firm needs to layer your email security in Microsoft 365 for maximum protection
Risks to your law firms’ email security have never been greater. With remote work still as popular as ever and an explosion in digital transformation projects, there is an increase in the risks of outbound data loss. In fact, we know that 85% of law firms using Microsoft 365 had an email data breach in the last 12 months.
- Previous Page
- Page1
- Page2
- Page3
- Page4
- Next Page


