All On Demand articles – Page 3
-
Webinar
Conducting Investigations in a Zero-Trust Environment
Every day, organisations are faced with insider and outsider threats. Because of that, the Zero-Trust security approach is quickly becoming the standard for both corporations and Government agencies.
-
Webinar
Data: New Asset or New Liability?
While corporate data has the potential to improve revenue, reduce expenses and mitigate risk, citizens around the world are demanding more protection for their personal information.
-
Webinar
Freedom to Focus: Securely empowered employees, protected businesses
Did you know that 83% of IT leaders believe that smart technology plays a key role in empowering employees to act securely?
-
Webinar
Solving Data Mapping with a no-code and automated approach to keep up with ever-increasing data sources and SAAS
Data volumes are increasing exponentially, and companies need seamless and trustworthy technology that will enable them to keep track of their data sources and know what PII is there.
-
Webinar
Data Retention: The Blind Spot in your Privacy Programme (Central & Eastern Europe)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Webinar
Data: New Gold or New Liability?
While corporate data has the potential to improve revenue, reduce expenses and mitigate risk, citizens around the world are demanding more protection for their personal information.
-
Webinar
The Human Element: Reducing Email Data Breaches By Combatting Human-Activated Risk
Did you know that 91% of cyberattacks are distributed by email and 82% of data breaches involve a human element?
-
Webinar
Data Retention - The blind spot in your privacy program (South Asia region)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Webinar
Expert Webinar: Supplier Risk Management Best Practices
What best-practice techniques are employed to streamline supplier risk management processes – from vendor onboarding and enhanced due diligence to ongoing monitoring?
-
Webinar
Driving Accountability across the Organization with Cyber Risk Governance
Organisations are increasingly looking into setting a uniform standard for their cyber security programs that can sit across the entire structure. However, they first need to determine what standard is appropriate - and find a way to measure performance against it consistently.
-
Webinar
The CISO’s Role in ESG: Aligning with Your Business’ Goals
As investors, other companies, employees, customers, and other stakeholders increasingly look to ESG policies and metrics to make investment, business, and purchasing decisions, the role of compliance must expand
-
Webinar
After the attack: Mitigating Organisational Impact of a Data Breach (Central & East Europe Region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Webinar
Keep Customer Trust: Manage & Automate your Consent Compliance & Data Governance
Trust takes years to build, seconds to break, and forever to repair.
-
Webinar
Connecting the dots: How OSINT can improve outcomes in financial crime investigations
Recent events have brought Open Source Intelligence (OSINT) more sharply into public consciousness. The increased availability of satellite imagery, social media, shipping data and a wide range of other sources has shaped our understanding of Russia’s invasion of Ukraine.
-
Webinar
The Next Generation of Female GRC Leaders: Senior Women Share Advice on Success and Progression
In this session, leaders in GRC roles share their experience of progression in their careers and what advice and guidance they would give to younger women to look at developing a career in Governance, Risk and Compliance.
-
Webinar
UK Data Protection Index Panel
The UK Data Protection Index is produced by Data Protection World Forum and The DPO Centre.
-
Webinar
After the attack: There’s No Place for Guesswork in Cyber Attack Investigations (Nordic Benelux region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”
-
Webinar
After the attack: There’s No Place for Guesswork in Cyber Attack Investigations (South Europe region)
You can’t ignore the headlines. We have seen that any organisation, at any time, can suffer a cybersecurity attack, resulting in a devastating data breach. It’s a question of “when” rather than “If”.
-
Webinar
Data Retention - The blind spot in your privacy program (Nordic and Benelux region)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Webinar
Keeping pace with emerging threats: Summer 2022 Round-up
In this webinar, our threat intelligence team share some of the latest threats and trends they’ve uncovered, including cryptocurrency scams exploiting Ukrainian donation appeals, LinkedIn impersonation emails targeting job hunters, and zero-day exploits circulating on the dark web.