Webinars – Page 10
-
WebinarManaging Data Retention Strategies Under CPRA
Addressing data retention is the surest way to mitigate risks and costs of a data breach. With CPRA now requiring organizations to provide up-to-date and enforced retention schedules, it’s more important than ever that your organization maintains compliant practices to minimize damages. Understand if your organization is at risk and take action now
-
WebinarPractical Steps for Building a De-Risked Compliant Data Inventory
Today, every company’s data is a valuable asset, which has led to a tendency to keep data “just in case we need it later.” Companies are now collecting, storing, and managing vast amounts of data without understanding where it all lives. This major blind spot creates significant privacy and security risks.
-
WebinarActing on Brexit and Schrems II
There are 2 things on the minds of European privacy pros that have nothing to do with the pandemic: Brexit and Schrems II.
-
WebinarPrivacy in the Boardroom: The Metrics, KPIs and Reporting You Need
Stakeholder support for a privacy program is key, especially as compliance programs grow and organizations focus their attention on an increasing number of regulations and frameworks from around the world.
-
WebinarData Retention & Minimisation: Lessons Learned in 2020
Data retention and minimisation played a key role in numerous cases and enforcement actions throughout 2020. Worryingly, the range of infractions varied widely, teaching us that it is certainly an area that is very challenging for organisations to address.
-
WebinarHow to Successfully Manage Ungoverned Data for Risk Mitigation
Enterprises are collecting and managing more data than ever to create value, making every company a “data” company. But for data to provide value, organizations need to know where it is, who has access to it, how it’s managed, and how it needs to be secured and protected.
-
WebinarOvercoming Data Privacy’s Biggest Challenge: Data Retention
Addressing data retention is the surest way to mitigate risks and costs of a data breach.
-
WebinarMany Ways to Defeat Multi-Factor Authentication
Everyone knows that multi-factor authentication (MFA) is more secure than a simple login name and password, but too many people think that MFA is a perfect, unhackable solution. It isn’t!
-
WebinarCyber Security: Employee Awareness in the New Normal
Phishing attacks are often seen as the most damaging and most common threat facing businesses. More people are now working from home and for many, this has the new normal – as a result employees have an increased risk of being targeted.
-
WebinarWhat ROI to expect from better consent & preference management?
In this session, you will discover different use cases of consent and preference management in retail, both physical and digital.
-
WebinarHow to Find Your Biggest Governance, Security, and Privacy Risks
Over the last decade, data has become the driving force behind businesses, economies, and daily life.
-
WebinarCrafting a solution to Schrems II: Is a permanent fix possible?
On July 16, the EU’s highest court once again delivered a bombshell data protection ruling by annulling the EU-US Privacy Shield.
-
WebinarThe Schrems II Decision: What it Means for Privacy Programs
On 16 July, the Court of Justice of the European Union released its much-anticipated decision in the Schrems II case, invalidating the US-EU Privacy Shield and providing clarity around Standard Contractual Clauses (SCCs).
-
WebinarA Necessary Change in the Data Protection Mindset
It is time for a paradigm shift in security.
-
WebinarDefining Privacy Success and the struggle to measure it
Most companies are years into their privacy programs, but still haven’t figured out part of the essentials: how to accurately measure the success and impact of the privacy team’s work.
-
WebinarDefensible Data Retention: The Holy Grail of Mitigating Data Privacy Risks
Over-retention of data is a major data privacy risk. US and international regulations specifically require that companies ensure their retention standards are up-to-date and enforced, and that all obsolete records containing regulated sensitive data are disposed of promptly.
-
WebinarBuilding an Insider Threat Program for your Organization
Cybersecurity measures are often focused on threats from outside an organization rather than threats posed by individuals inside an organization.
-
WebinarScaling Data Governance in Line with Business Growth
Strong data governance involves getting the right people, processes and technologies in place that are needed to manage and protect the organisations data assets. It forms the basis for effective Legal GRC practices and makes the efficient use of trustworthy data possible.
-
WebinarThe Glass House: anonymity and data exposure in an AI world
All organizations live in a Glass House. From ISP’s to content delivery networks to website advertising, all commercial internet activity is being tracked, collected and monetized by a highly-automated data broker marketplace.
-
WebinarNavigating Global Privacy Laws Along the IT Asset Lifecycle
As if cyberthreats weren’t enough, consumer privacy laws have put increased pressure on IT leaders to keep personal or sensitive data from being breached. This includes mandates to immediately and thoroughly respond to data deletion requests, data retention expirations, and other cases of no-longer-needed data across your entire data ...









