Webinars – Page 4
-
Webinar
Data: New Gold or New Liability?
While corporate data has the potential to improve revenue, reduce expenses and mitigate risk, citizens around the world are demanding more protection for their personal information.
-
Webinar
The Human Element: Reducing Email Data Breaches By Combatting Human-Activated Risk
Did you know that 91% of cyberattacks are distributed by email and 82% of data breaches involve a human element?
-
Webinar
Data Retention - The blind spot in your privacy program (South Asia region)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Webinar
After the attack: There’s No Place for Guesswork in Cyber Attack Investigations (South Asia Edition)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Webinar
Expert Webinar: Supplier Risk Management Best Practices
What best-practice techniques are employed to streamline supplier risk management processes – from vendor onboarding and enhanced due diligence to ongoing monitoring?
-
Webinar
Driving Accountability across the Organization with Cyber Risk Governance
Organisations are increasingly looking into setting a uniform standard for their cyber security programs that can sit across the entire structure. However, they first need to determine what standard is appropriate - and find a way to measure performance against it consistently.
-
Webinar
The CISO’s Role in ESG: Aligning with Your Business’ Goals
As investors, other companies, employees, customers, and other stakeholders increasingly look to ESG policies and metrics to make investment, business, and purchasing decisions, the role of compliance must expand
-
Webinar
After the attack: Mitigating Organisational Impact of a Data Breach (Central & East Europe Region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Webinar
Keep Customer Trust: Manage & Automate your Consent Compliance & Data Governance
Trust takes years to build, seconds to break, and forever to repair.
-
Webinar
Connecting the dots: How OSINT can improve outcomes in financial crime investigations
Recent events have brought Open Source Intelligence (OSINT) more sharply into public consciousness. The increased availability of satellite imagery, social media, shipping data and a wide range of other sources has shaped our understanding of Russia’s invasion of Ukraine.
-
Webinar
The Next Generation of Female GRC Leaders: Senior Women Share Advice on Success and Progression
In this session, leaders in GRC roles share their experience of progression in their careers and what advice and guidance they would give to younger women to look at developing a career in Governance, Risk and Compliance.
-
Webinar
UK Data Protection Index Panel
The UK Data Protection Index is produced by Data Protection World Forum and The DPO Centre.
-
Webinar
After the attack: There’s No Place for Guesswork in Cyber Attack Investigations (Nordic Benelux region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”
-
Webinar
After the attack: There’s No Place for Guesswork in Cyber Attack Investigations (South Europe region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Webinar
Data Retention - The blind spot in your privacy program (Nordic and Benelux region)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Webinar
Keeping pace with emerging threats: Summer 2022 Round-up
In this webinar, our threat intelligence team share some of the latest threats and trends they’ve uncovered, including cryptocurrency scams exploiting Ukrainian donation appeals, LinkedIn impersonation emails targeting job hunters, and zero-day exploits circulating on the dark web.
-
Webinar
Data Retention - The blind spot in your privacy program (DACH region)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Webinar
After the attack: Mitigating Organisational Impact of a Data Breach (DACH region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Webinar
Data Retention - The blind spot in your privacy program (Southern Europe region)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Webinar
After the attack: Mitigating Organisational Impact of a Data Breach? (LATAM region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.