Library – Page 55
-
Video
Ethics and Consent: Marketing and an Ethical Use of Data
CMOs need to think seriously about how and why they use data. But, while they harness the power of data, they must do so ethically - taking care of human values at the same time.
-
Video
Practical Ways to Operationalize Schrems II & International Data Transfers
The past 18 months have seen an increased focus on the regulation of international data transfers with the CJEU’s Schrems II decision driving updates from both the EDPB and European Commission.
-
Video
Europe’s Gamble on AI Regulations and what this means for Business
The proposed AI Regulation is a vast and ambitious law that attempts to both facilitate the use of AI across Europe and protect Europeans from its more harmful effects.
-
Event
PrivSec Global deep-dives into AI Regulation
At PrivSec Global today, a panel of experts explored the proposed AI regulation and what it will mean for business.
-
Video
GRC TV: Transforming Third Party Risk into Business Advantage
Access this episode on demand, as we delve into transforming third party risk into business advantage
-
ebook
The Empowered Employee: Influencing Security Behavior with Zero Trust Data Protection
How to Spark Employee Engagement Around Cybersecurity
-
Video
GRC TV: In Conversation With Michelle King on Workplace Confidence, Equality and Leadership
Access this episode on demand, as we delve into workplace confidence, equality and leadership.
-
Webinar
Hidden Challenges of Data Retention & Minimization
With technological data innovations comes a plethora of new data, and companies are being overwhelmed with enterprise data which can be a liability.
-
Sponsored
Ransomware: when your data backup is your last line of defence, make it count
Not all data backups are created equal.
The cyber-threat landscape is ever evolving, and undoubtedly one of the biggest current threats is ransomware. Ransomware is a type of malicious software that threatens to publish the victim’s data, or perpetually block access to it, unless a ransom is paid. For modern organizations who rely on data to operate and thrive, this kind of attack can be catastrophic. A recent global report from Sophos found that the average cost of paying a ransom was $1.4 million, or $730,000 in equivalent loss of revenue owing to downtime should they choose not to. -
Video
Building an effective security strategy for privacy
Information, data privacy and security concerns are a persistent trend and central to all too many political and ethical scandals, data privacy has become one of the defining social and cultural issues today.
-
Video
Data lifecycle management challenges
One of the main challenges faced by companies involves adequately managing the information at hand, which is essential when making the right decisions.
-
Video
Shaping the Future of Data Privacy Globally
A look at compliance challenges faced by globally-data driven businesses relying on international data transfers.
-
Video
Data Management and Protection as a Service (DPaaS) to improve business continuity within your organisation
According to a report published by Transparency Market Research, the market for Data Protection as a Service (DPaaS) is expected to reach $46 billion by 2024.
-
Video
Getting to grips with the very real threat of modern ransomware and its impact on organisations
Infrastructure and operations leaders responsible for data protection must evaluate new ransomware protection features as critical prerequisites when choosing backup platforms.
-
Video
Ransomware Jail. Is There Any Way Out?
Tired of seeing non-stop ransomware news and trying to understand how it got to this point?
-
Video
Protecting privacy and ensuring data flows
How do companies leverage data flows to conduct everyday operations?
-
Video
Getting to grips with increased data management complexity in a post-Pandemic world
In an age of unprecedented change and complexity, managing data complexity is easier this is easier said than done.
-
Video
Meeting Identity and Access Management Challenges in the Era of Mobile and Cloud
Organisations are flocking to cloud services and mobile devices to cut costs and boost productivity.
-
Video
Outlining Effective Performance metrics provide transaction-level reporting to measure efficiency of services and projects
Many organisations lack defined metrics that report on the status and maturity of an IAM environment, such as enterprise service usage and enterprise control objective compliance.
-
Video
Reconciling Bring Your Own Device (BYOD) with the Corporate Network
To manage or not to manage—there really is no choice between the two for today’s enterprises. Employees, contractors, partners, and others are bringing in personal devices and connecting to the corporate network for professional and personal reasons.