All EMEA articles – Page 2
-
Webinar
UK Data Protection Index Panel
The UK Data Protection Index is produced by Data Protection World Forum and The DPO Centre.
-
Webinar
Conducting Investigations in a Zero-Trust Environment
Every day, organisations are faced with insider and outsider threats. Because of that, the Zero-Trust security approach is quickly becoming the standard for both corporations and Government agencies.
-
Webinar
Solving Data Mapping with a no-code and automated approach to keep up with ever-increasing data sources and SAAS
Data volumes are increasing exponentially, and companies need seamless and trustworthy technology that will enable them to keep track of their data sources and know what PII is there.
-
Webinar
Driving Accountability across the Organization with Cyber Risk Governance
Organisations are increasingly looking into setting a uniform standard for their cyber security programs that can sit across the entire structure. However, they first need to determine what standard is appropriate - and find a way to measure performance against it consistently.
-
Webinar
After the attack: Mitigating Organisational Impact of a Data Breach (Central & East Europe Region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Webinar
Connecting the dots: How OSINT can improve outcomes in financial crime investigations
Recent events have brought Open Source Intelligence (OSINT) more sharply into public consciousness. The increased availability of satellite imagery, social media, shipping data and a wide range of other sources has shaped our understanding of Russia’s invasion of Ukraine.
-
Webinar
UK Data Protection Index Panel
The UK Data Protection Index is produced by Data Protection World Forum and The DPO Centre.
-
Webinar
After the attack: There’s No Place for Guesswork in Cyber Attack Investigations (Nordic Benelux region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”
-
Webinar
After the attack: There’s No Place for Guesswork in Cyber Attack Investigations (South Europe region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Webinar
Data Retention - The blind spot in your privacy program (Nordic and Benelux region)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Webinar
Data Retention - The blind spot in your privacy program (DACH region)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Webinar
Data Retention - The blind spot in your privacy program (Southern Europe region)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Webinar
The Privacy Foundation - Building Your Program with a Data Inventory
The foundation of any data privacy and protection program starts with the DATA! Organizations that start with data discovery develop the insights needed to manage data for security, privacy, and compliance purposes.
-
Webinar
Executive Briefing: Mitigating the ICMAD SAP Vulnerabilities
Discuss how the Onapsis Research Labs and SAP Product Security Response Team worked in close partnership to identify, assess, and patch critical ICMAD vulnerabilities — and what you need to do to mitigate the risk to your SAP applications.
-
Webinar
Critical Data Collection Methodologies and Use Cases
Each legal case or investigation has its own unique challenges, objectives, and goals. Experts must understand how to work with proven, advanced technologies to deliver a methodical and defensible data collection approach – regardless of whether it’s for a forensic investigation or e-discovery matter.
-
Blog
A single AML supervisor and rulebook might just be what’s needed to drive true collaboration in Europe
As European finance ministers agreed to progress plans for a major reform of anti-money laundering regulation in the European Union, Nina Kerkez outlines the likely benefits and challenges.
-
Webinar
The Future of Anti-Financial Crime? Enhancing Effectiveness with the Investigator-Centric Approach
In this webinar we will discuss how FIs can apply innovative approaches developed for national security and law enforcement agencies to enhance the efficiency and effectiveness of their anti-financial crime controls.
-
Webinar
How top privacy pros are scaling their privacy programs
Processes and technology are two key components to make any privacy program scale over time. But how do you know what to prioritise, automate and dedicate resources to?
-
News
Irish DPC welcomes increased funding of €4.1 million
The Data Protection Commission (DPC) has welcomed the additional funding of €4.1 million for the office, announced by the Government in Budget 2022.
-
News
Footballers seek legal action over GDPR violation
Hundreds of footballers have threatened to take legal action against 17 firms for the trading of their performance data.