Webinars – Page 5
-
Webinar
Data Retention - The blind spot in your privacy program (Nordic and Benelux region)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Webinar
Keeping pace with emerging threats: Summer 2022 Round-up
In this webinar, our threat intelligence team share some of the latest threats and trends they’ve uncovered, including cryptocurrency scams exploiting Ukrainian donation appeals, LinkedIn impersonation emails targeting job hunters, and zero-day exploits circulating on the dark web.
-
Webinar
Data Retention - The blind spot in your privacy program (DACH region)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Webinar
After the attack: Mitigating Organisational Impact of a Data Breach (DACH region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Webinar
Data Retention - The blind spot in your privacy program (Southern Europe region)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Webinar
After the attack: Mitigating Organisational Impact of a Data Breach? (LATAM region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Webinar
The Privacy Foundation - Building Your Program with a Data Inventory
The foundation of any data privacy and protection program starts with the DATA! Organizations that start with data discovery develop the insights needed to manage data for security, privacy, and compliance purposes.
-
Webinar
How Successful Security Teams Manage Risk to Build Trust & Drive Growth
Abundant data is now available to put numbers behind what we instinctively know: trusted organizations are more successful. InfoSec teams have a prominent role in helping their organization become trusted, and therefore more successful: first and foremost, by communicating changes in the IT & security risk posture.
-
Webinar
Managing sanctions risk – The benefits of an intelligence-led approach?
The recent imposition of deep-cutting sanctions on the Russian Government and entities within the orbit of President Putin has exposed the limitations of traditional approaches to sanctions risk management. Recent news stories about the tactics being used by individuals targeted by these restrictions to maintain access to funds and assets make it clear that reliance on sanction screening alone, may not be sufficient.
-
Webinar
The Next Step in Privacy Evolution: Maturing Your Privacy Program Through Automation, Intelligence & Governance
With expanding regulations, increased personal data use, and more informed consumers & employees, privacy professionals can no longer rely on manual workflows and out-of-date information to run their privacy programs.
-
Webinar
TRUST with Data Mesh
Do you want to empower your organization with access to trusted data but struggle to govern and manage data at sufficient speed and scale? Advances in data and cloud technology have addressed elements of data volume and processing power but having consistent agility to respond to change is a growing challenge.
-
Webinar
Data Awareness to Data Intelligence: Leveraging the power of automation (LATAM Region)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Webinar
SaaS innovation & data exposure, the shocking truth about your cloud innovation tools
The last 18 months have caused many organisations to re-examine their data security processes and policies. Cloud services are now likely to form a critical part of your operations, with many CISO’s looking out for the next Solar Winds or Log4J that has the potential to compromise their data. Our annual data risk report and latest research carried out by Forrester, unearthed some shocking truths about the state of SaaS data protection in Europe.
-
Webinar
Data Control: How IT and Security leaders are driving innovation in data privacy and governance
Data privacy isn’t just a challenge for your Legal team. IT and Security leaders are spearheading innovation: elevating data control as the key to scalable and future proof privacy compliance, providing the platform to manage risk, and collaborating with marketing and data teams to ensure data supports growth initiatives.
-
Webinar
After the attack: There’s No Place for Guesswork in Cyber Attack Investigations (On-Demand)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Webinar
Executive Briefing: Mitigating the ICMAD SAP Vulnerabilities
Discuss how the Onapsis Research Labs and SAP Product Security Response Team worked in close partnership to identify, assess, and patch critical ICMAD vulnerabilities — and what you need to do to mitigate the risk to your SAP applications.
-
Webinar
Wait a minute, whose data is that?! Uncovering your biggest data governance, security and privacy risks
In order to establish effective governance, privacy, or security programs, you first need to truly understand your data. What data do you store? Who owns it? Where is it located? Who has access to it? What regulations apply to it? Can you quickly and easily respond to data requests? Without a robust data inventory and understanding these types of questions, there is a limited chance of success achieving any Legal GRC objective.
-
Webinar
Investigating illicit trade: The importance of technology and Open Source Intelligence
Illicit trade is a popular vector for sophisticated transnational organised crime groups (OCGs) due to its relatively low risk and high reward nature. By leveraging modern technologies and exploiting the increasingly frictionless structures of globalised trade OCGs are profiting handsomely.
-
Webinar
Privacy Management: The Data-Driven approach to managing risk and automating compliance
Data privacy regulations are becoming more stringent in terms of how data needs to be managed for compliance.
-
Webinar
GDPR enforcement trends – lessons from 2021
2021 was a landslide year for GDPR enforcement – but what’s actually changed for privacy teams and how they should prioritise?