Library – Page 25

  • Data Protection Update- United Kingdom
    Video

    Data Protection Update: United Kingdom

    2022-07-05T15:03:00Z

    The UK is set to overhaul its data protection and privacy rules, with changes to cookies, accountability and regulation all on the table.

  • Insider Threats- Detecting and Mitigating the Threat From Within
    Video

    Insider Threats: Detecting and Mitigating the Threat From Within

    2022-07-05T15:01:00Z

    Insider threats can lead to devastating security incidents—whether intentional or negligent, and perpetrated by a from a trusted employee, ex-employee, or contractor.

  • Data Protection Update- United States
    Video

    Data Protection Update: United States

    2022-07-05T14:59:00Z

    Connecticut and Utah joined the ranks of US states with a comprehensive privacy law this year. The privacy patchwork continues to stitch itself together—but how should privacy professionals respond. And is anyone still hoping for a federal privacy law?

  • How to Manage Third-Party Risk in Your Supply Chain
    Video

    How to Manage Third-Party Risk in Your Supply Chain

    2022-07-05T14:57:00Z

    Supply chain risks take many forms and can be devastating to your organisation if not properly mitigated. From cybersecurity to reputational and legal issues, managing risk among your vendors and other third parties can be a daunting task.

  • Keeping Pace with Emerging Threats
    Video

    Keeping Pace with Emerging Threats

    2022-07-05T14:55:00Z

    Cyber criminals are leveraging innovative techniques and taking advantage of new security vulnerabilities. Organizations must evolve and adapt their defenses to protect against the next wave of cybersecurity threats.

  • Secure SAP Development at the Speed of Digital Transformation
    Video

    Secure SAP Development at the Speed of Digital Transformation

    2022-07-05T14:53:00Z

    SAP applications are the cornerstone of business operations and have become a top attack vector for enterprises.The need for secure development and testing of applications have never been greater. Yet there is a lack of tools that sufficiently support SAP languages, components, and development environments, resulting in the use of manual code reviews which are error prone.

  • The human element- Fixing the behaviors that lead to breaches
    Video

    The human element: Fixing the behaviors that lead to breaches

    2022-07-05T14:17:00Z

    Cybercriminals continue to launch increasingly sophisticated social engineering attacks. Coupled with a rise in human error, it’s no surprise that 85% of today’s security breaches involve a human element.

  • Conducting a Transfer Impact Assessment- Best Practice
    Video

    Conducting a Transfer Impact Assessment: Best Practice

    2022-07-05T14:15:00Z

    The transfer impact assessment (TIA) might be among the most demanding of the GDPR’s requirements. Assessing the surveillance regime of a third country can be a daunting task even for an experienced legal department—not to mention the thousands of SMEs engaged in international data transfers.

  • Choosing the Right Cybersecurity Framework
    Video

    Choosing the Right Cybersecurity Framework

    2022-07-05T14:12:00Z

    Implementing a cybersecurity framework is a great way to improve your company’s security posture. But there are a lot of frameworks to choose from, and their suitability varies depending on your company’s industry, size and resources.

  • The ROI of Data Privacy
    Video

    The ROI of Data Privacy

    2022-07-05T14:10:00Z

    Turning privacy into a business enabler by raising data privacy awareness and business accountability with key GDPR requirements. Implementing a data privacy programme that will channel data privacy to boost revenue, market reputation & customer trust leading to a meaningful ROI. Video: The ROI of Data Privacy ...

  • Re-Thinking Trusted Data
    Video

    Re-Thinking Trusted Data

    2022-07-05T14:08:00Z

    The explosive growth of data and the value it creates calls on data professionals to level up their programs to build, demonstrate, and maintain trust. The days of fine print, pre-ticked boxes, and data hoarding are gone and strong collaboration from data, privacy, marketing and ethics teams is necessary to design trustworthy data-driven practices.

  • Data Retention and Minimisation- Best Practice
    Video

    Data Retention and Minimisation: Best Practice

    2022-07-05T14:06:00Z

    Getting data retention and minimisation right is crucial to ensuring effective data protection compliance. Only collecting the data you need, and only storing it for as long as required, significantly reduces the likelihood of a data breach or other violation.

  • Building a Privacy Management Program
    Video

    Building a Privacy Management Program

    2022-07-05T14:01:00Z

    A privacy management programme must be well-informed, accesible, and dynamic enough to adapt to fast-changing requirements.

  • How to Avoid Software Supply Chain Attacks
    Video

    How to Avoid Software Supply Chain Attacks

    2022-07-05T12:28:00Z

    From Solarwinds to Kaseya to Log4j—the security risk from software supply chain attacks shows no sign of abating.

  • Data Centres- Just How Bad Is the Environmental Impact?
    Video

    Data Centres: Just How Bad Is the Environmental Impact?

    2022-07-05T12:21:00Z

    Data minimisation and storage limitation are key principles of data protection. But alongside the impact on privacy, minimising the amount of personal data you’re processing has another benefit: reducing carbon emissions.

  • NFTs- Just a Craze or Here to Stay?
    Video

    NFTs: Just a Craze or Here to Stay?

    2022-07-05T12:19:00Z

    Many non-fungible token (NFT) investors are not yet seeing the returns they hoped for. But some argue that the price of NFTs could rebound—and that the truly game-changing nature of NFTs has yet to be realised.

  • Cyber Insurance- The Looming Systemic Crisis
  • Should Everyone Have a Digital Identity?
    Video

    Should Everyone Have a Digital Identity?

    2022-07-05T11:28:00Z

    Governments worldwide are developing digital identity schemes that, they claim, will improve bureaucracy and ensure fairer access to state welfare. But privacy campaigners are skeptical about the prospect of every individual’s identity being digitised.

  • Why Effective Process and Governance is as Important as Technology When IAM issues arise
    Video

    Why Effective Process and Governance is as Important as Technology When IAM issues arise

    2022-07-05T10:47:00Z

    When IAM issues arise, organizations often lean too heavily on implementing technology with the idea that it will solve all issues related to identity and access.

  • Digital Identity- Will We Ever See a World Without Passwords?
    Video

    Digital Identity: Will We Ever See a World Without Passwords?

    2022-07-05T10:45:00Z

    Even with good password management techniques, passwords are a flawed approach to account security. Many of the world’s major tech companies are proposing alternative mechanisms to verify identity and manage access. But what works best—and are there privacy trade-offs?