All GLOBAL articles
-
Webinar
Why Healthcare Organizations Need Modern IAM Solutions
Webinar produced by GRC World Forums in association with ManageEngine
-
Webinar
How Financial Services Companies Can Protect Themselves Against Financial Crime
Webinar produced by GRC World Forums in association with Exterro
-
Webinar
The Option of Qualitative Versus Quantitative is Not a Choice – it Really isn’t. You Have to do Both.
Webinar produced by GRC World Forums in association with Archer
-
Webinar
10 Essential Steps to Streamline Third-Party Risk Assessments
Webinar produced by GRC World Forums in association with OneTrust
-
Webinar
Investigating Financial Crime and Fraud: Technology Showcase
Conducting investigations involving financial crimes such as fraud, money laundering, political corruption, insider trading or cybercrime, can be very complex.
-
Webinar
UK’s Post-Brexit GDPR Reforms: What to Expect, How to Adapt
On January 1 2021, the UK formally and effectively left the European Union. As a result, the EU GDPR no longer applies in the UK. Currently, the UK DPA 2018 sets out the data protection framework in the UK. Are you UK-DPA compliant?
-
Webinar
Valid Proof of Consent: How to Cultivate Trust & Demonstrate Compliance
Data, trust and compliance are three big focus areas for businesses.
-
Webinar
Cybersecurity Threats: Know The Risks Your Third Parties Pose to Your Business and How to Defend Against Them
In 2021 alone there was a 62% global attack spike in ransomware, and it was made clear that the cyber threats are becoming not just more common, but also more sophisticated.
-
Webinar
The CISO’s Role in ESG: Aligning with Your Business’ Goals
As investors, other companies, employees, customers, and other stakeholders increasingly look to ESG policies and metrics to make investment, business, and purchasing decisions, the role of compliance must expand
-
Webinar
Keep Customer Trust: Manage & Automate your Consent Compliance & Data Governance
Trust takes years to build, seconds to break, and forever to repair.
-
ebook
The Complete Guide to the Vendor Risk Management (VRM) Lifecycle
This eBook will walk you through the ten stages of the VRM lifecycle and provide information on the common challenges organizations face at each stage. It will also provide you with tips and tricks on how to get beyond these challenges.
-
Podcast
Onapsis Podcast: 4 Things to Consider as You Select a Vulnerability Management Provider
The PrivSec Podcast is a series of discussions that covers the complete privacy, data protection and security spectrum, featuring subject matter experts.
-
Webinar
The Art of Innovating Securely in The Cloud
As the threat and regulatory landscape continues to evolve, along with the acceleration in remote working and access to data, how do you protect your most prized assets, whilst growing innovatively and securely, and delivering a seamless customer experience?
-
Webinar
Data Awareness to Data Intelligence: Leveraging the power of automation
The increasing number and complexity of privacy laws, like the upcoming California Privacy Rights Act, as well as the continued emergence of good privacy practices and compliant data use as a competitive differentiator have been the driving force for organizations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Webinar
2022 Trend Watch: Realizing the Full Potential of SASE and Zero Trust
The events of 2021 have created a paradigm shift in cybersecurity. The steady cadence of large-scale cyber attacks have accelerated a move away from perimeter-focused security to Zero Trust. While core foundations of Zero Trust have been implemented, many tech leaders are still missing a critical piece of the puzzle for safeguarding their data.
-
Webinar
Achieving Full Privacy Compliance: After Cookie Consent, What’s Next?
Today, implementing a cookie consent solution is a significant first step to adhere to privacy regulations such as GDPR and PIPL.
-
Webinar
Building Safer Pathways for Cloud Migration and Storage
Cloud data storage provide affordable, easily managed options for keeping and maintaining expanding data stores as a business grows, increasing not only productivity but also resiliency, service continuity, and business agility.
-
News
UK among the top 10 countries most affected by ransomware.
Israel found to be the main source of ransomware samples, research reveals.
-
Webinar
Privacy challenges for global companies
What are the main struggles for global companies in a privacy and data-driven world, and how do we solve those challenges?
-
ebook
Zero Trust Data Protection Across the Google Ecosystem
Cloud Security Best Practices for Business Leaders Guide