Library – Page 41
-
Video
How Has the Explosion in eCommerce Created Multiple New Opportunities for Fraudsters and Launderers
Is ecommerce fraud easy to detect? That depends on the skill and ingenuity of the cyber-criminal. That said, there are many common signs of fraud that you and your staff should know about and continually.
-
Video
Analysing the Development of KYC Utilities and Data Sharing Prospects
KYC utilities raise significant concerns for banks about privacy and data sharing.
-
Webinar
Confident Breach Readiness: Why Log4j Highlights the Urgency of Data Encryption
As evidenced by the Log4j vulnerability, cyber attacks and data breaches are escalating in frequency, scope, and sophistication. Cyber attacks have now become a guarantee, especially for large organizations. How can enterprise technology leaders remain confident in their security posture when networks and systems are at risk of being compromised?
-
Video
Deep Dive into How to Effectively Manage Know-Your-Customer-Anti–Money Laundering (KYC–AML) Compliance
This session takes a look at how these steps are put in place and what potential pitfalls may arise.
-
Video
Getting to Grips with the Essentials of an Effective Sanctions Compliance Programme in Order to Keep in Line with Regulatory Policies in Any Legislative Environment (State, National, and International
Considering the current economic and political environment, both globally and domestically, it is crucial that financial institutions maintain a strong sanctions compliance program (SCP). A financial institution’s SCP should be risk-based and unique to each financial institution.
-
Video
Move Towards Sanctions for Cyber, Corruption, Election Fraud, Climate Control and Human Rights: What to expect in 2022?
Companies often resist government mandates or say that no single set of regulations can capture the challenge of locking down different kinds of computer networks.
-
Video
Mapping Your Exposure Against the New ML
An Anti-Money Laundering compliance program combines everything a company does to meet the compliance norms: built-in internal operations, user-processing policies, accounts monitoring and detection, and reporting of money laundering incidents.
-
Opinion
Connect with the expert: GRC World Forums speaks to Microsoft’s Hemma Prafullchandra
Hemma Prafullchandra is Chief Technology Officer of Microsoft Microsoft 365 Security and Compliance at Microsoft.
-
News
Global data protection software market to experience a decade of growth
Fresh studies reveal that the global data protection software is set to undergo ten years of growth, with markets predicted to expand by 31.5% between now and 2032.
-
Video
Embedding a culture of privacy
This sessions is hosted by Steve Wright, partner at Privacy Culture discussing the key ambitions companies wish to demonstrate what we mean by privacy compliance and the importance of people and process.
-
Video
The POPIA and Cookie Compliance
Most businesses use cookies and other tracking technologies to raise ad revenues, target prospective customers, or maintain their websites and apps. In Europe, the U.S., and several other regions, cookies have become a major compliance concern for legal teams.
-
Video
The Growth of Data Protection and Cybersecurity Across Africa
South Africa has one of the strongest data protection and cybsecurity regulatory regimes on in Africa—but it’s far from the only African country that it developing its digital legal framework.
-
Video
South Africa’s New International Data Transfer Rules: Tougher Than Europe’s?
Transferring personal information across borders is among the biggest compliance challenges for privacy professionals.
-
Video
COVID-19 and the Rise of Cybercrime in South Africa: How to Turn the Tide
Like with many countries worldwide, the COVID-19 pandemic has accelerated digital transformation in South Africa. Along with some social and economic benefits, the shift to remote work and online interactions has also spurred a rise in cybercrime that shows little sign of abating.
-
Video
Codes of conduct: Preparation, compliance and enforcement, with OneTrust
Codes of conduct are not a new concept, but have been a comparatively rarely used mechanism in the European privacy landscape.
-
Video
How to Avoid Sanctions Under the POPIA
South Africa now has one of the world’s leading data protection regimes. And along with strict rules on the processing and security of personal information, the POPIA brings large fines and even prison sentences for those who break the rules.
-
Webinar
The CISOs Role in Driving Trust: Why it Matters, How to Define it, and What Success Looks Like
Watch this session, The CISOs Role in Driving Trust: Why it Matters, How to Define it, and What Success Looks Like with OneTrust’s GRC Offering Lead. Gain insight on why more companies are naming chief trust officers, creating formalized trust initiatives, and measuring trust as a metric for themselves and their business partners.
-
Video
South Africa Cybercrimes Act: How Will the Law Impact South African Businesses?
South Africa’s Cybercrimes Act passed in May 2021 but has yet to come into force. The law creates new criminal offences for many cyber crimes, including hacking, ransomware, and cyber forgery.
-
Video
GDPR Compliant? The Extra Steps You’ll Need to Take to Comply with South Africa’s POPIA
The EU’s General Data Protection Regulation (GDPR) is often cited as the world’s toughest data protection law. Many organizations have worked hard to bring themselves into GDPR compliance.
-
News
Fresh data protection initiative underway in Middle East and Africa region
A collaboration project has been announced between two industry-leading security solutions providers that experts say will future-proof digital infrastructures in countries across the Middle East and Africa global region.