All Webinars articles – Page 3
-
WebinarWhen Good Data Goes Bad: How to Shine a Light on Sensitive, Toxic, and Risky Data
With numerous state-based (California, Virginia, Colorado….) privacy regimes now in place, the mishandling of sensitive data won’t be tolerated – by regulators or consumers. The challenge is: with mounting volumes of user created data under management, most of which is “dark”, how can you protect what you don’t even know you have?
-
WebinarOperationalizing privacy: A key to legal defensibility for in-house Counsel
There was a time when a successful privacy program could only rely on documentation, checklists, spreadsheets, and emails. However, the complexity of today’s privacy concerns necessitates smarter, faster, and more scalable solutions, and the old programs must become pragmatic.
-
WebinarThe Art of Innovating Securely in The Cloud
As the threat and regulatory landscape continues to evolve, along with the acceleration in remote working and access to data, how do you protect your most prized assets, whilst growing innovatively and securely, and delivering a seamless customer experience?
-
WebinarWhy your law firm needs to layer your email security in Microsoft 365 for maximum protection
Risks to your law firms’ email security have never been greater. With remote work still as popular as ever and an explosion in digital transformation projects, there is an increase in the risks of outbound data loss. In fact, we know that 85% of law firms using Microsoft 365 had an email data breach in the last 12 months.
-
WebinarNot All Assurances are Created Equal – Assessed Entities and Relying Parties Beware!
With the cyber threat landscape constantly evolving, and the number and complexity of business-vendor relationships continuously growing, there is an increasing market need for reliable assurances.
-
WebinarEmployee DSARs: The Coming Deluge
Up until now, organizations have assumed that all data subject requests were the same.
-
WebinarDo You Know What Your Ransomware Readiness Score Is?
It’s not a matter of if, but when. Ransomware incidents are on the rise and it is crippling companies. But there are key things you can and should be doing to prevent and recover in the event of a ransomware attack.
-
WebinarHandling Tricky Employee Subject Access Requests
Being able to respond effectively to subject access requests (SARs) can be challenging, especially when they are complex requests from current or former employees.
-
WebinarFuture Proofing Your Privacy Program
Standing up and fortifying your company’s privacy program is serious business, particularly when new (and varying) privacy laws keep getting added to the books, and your day job to-do list isn’t getting any shorter.
-
WebinarWhere are you on the Data Provisioning Maturity Model?
The data provisioning maturity model acts as both a measuring stick and common framework for organizations to help illustrate what is needed to understand and ultimately improve their data protection program.
-
WebinarOneTrust GRC: Building a GRC Program That Fits Your Business | A First Line Friendly ISMS Suite
How much time do you spend transferring data across systems to execute your GRC program? Oftentimes, disparate systems across policy, privacy, IT risk, vendor risk, incident, and audit result in duplicated data across applications.
-
WebinarCyber Threats: Protect your remote employees
During COVID-19, 91% of financial services organisations reported an increase in outbound email traffic.
-
WebinarUS Data Privacy: Latest Regulations and Implementing Compliant and Defensible Practices
State-level momentum for comprehensive privacy bills is at an all-time high. After the California Consumer Privacy Act passed, multiple states proposed similar legislation to protect consumers in their states.
-
WebinarThe Conversation Continues: Where International Data Transfers Stand
You may sometimes get the feeling no progress is being made to solve the issue of transferring personal data from the European Union to other countries around the world. After the draft EDPB Recommendations and draft model Standard Contractual Clauses, no major changes have been communicated.
-
WebinarAddressing Sector Challenges in Data Privacy, Compliance, and Security
Over the past few years, new services and increased connectivity have made the financial services industry quicker and more agile.
-
WebinarRecovering Fast from Ransomware attacks
Ransomware has been blasting news feeds on a daily basis for years. Each article details the story of an organisation that can no longer access their business critical data.
-
WebinarThe Crucial Challenges Every Organisation Must Address
Changing legislation and increased risk from lawsuits from inadequate incident and breach management processes is a challenge for every General Counsel in 2021.
-
WebinarUsing FTK Imager: The Free Forensic Imaging Tool
Forensic imaging is essentially a ‘scene of crime’ process for digital information preservation. Decisions made while imaging can affect the entire investigation and could make or break your case.
-
WebinarData Retention and Records Management Under the CPRA
While the CCPA doesn’t explicitly address data retention and data minimization practices, California voters chose to expand their rights by passing the California Privacy Rights Act (CPRA) in November of 2020, which fills in those data retention and minimization gaps.
-
WebinarImproving Outcomes with Informatics Powered by Safe Data
Health organizations are working hard to safely leverage patient data across the care continuum to improve outcomes.
- Previous Page
- Page1
- Page2
- Page3
- Page4
- Next Page





