All On Demand articles – Page 6
-
Video
Crypto Crime and Risks to the Financial Sector
Pressured by sanctions, some governments have turned to an unexpected outlet to generate funds and move money – theft of cryptocurrencies. Cybercrime groups with ties to these governments have targeted cryptocurrency exchanges in recent years, with considerable success.
-
Video
Who is Winning the Race to Regulate Crypto?
As with any investment, it is crucial to assess Crypto potential role within a portfolio – such as diversification benefits and return enhancement – versus the risks, which include volatility, liquidity, and regulation, among others.
-
Video
How Has the Explosion in eCommerce Created Multiple New Opportunities for Fraudsters and Launderers
Is ecommerce fraud easy to detect? That depends on the skill and ingenuity of the cyber-criminal. That said, there are many common signs of fraud that you and your staff should know about and continually.
-
Webinar
Confident Breach Readiness: Why Log4j Highlights the Urgency of Data Encryption
As evidenced by the Log4j vulnerability, cyber attacks and data breaches are escalating in frequency, scope, and sophistication. Cyber attacks have now become a guarantee, especially for large organizations. How can enterprise technology leaders remain confident in their security posture when networks and systems are at risk of being compromised?
-
Video
Move Towards Sanctions for Cyber, Corruption, Election Fraud, Climate Control and Human Rights: What to expect in 2022?
Companies often resist government mandates or say that no single set of regulations can capture the challenge of locking down different kinds of computer networks.
-
Video
Mapping Your Exposure Against the New ML
An Anti-Money Laundering compliance program combines everything a company does to meet the compliance norms: built-in internal operations, user-processing policies, accounts monitoring and detection, and reporting of money laundering incidents.
-
Video
Embedding a culture of privacy
This sessions is hosted by Steve Wright, partner at Privacy Culture discussing the key ambitions companies wish to demonstrate what we mean by privacy compliance and the importance of people and process.
-
Video
The POPIA and Cookie Compliance
Most businesses use cookies and other tracking technologies to raise ad revenues, target prospective customers, or maintain their websites and apps. In Europe, the U.S., and several other regions, cookies have become a major compliance concern for legal teams.
-
Video
The Growth of Data Protection and Cybersecurity Across Africa
South Africa has one of the strongest data protection and cybsecurity regulatory regimes on in Africa—but it’s far from the only African country that it developing its digital legal framework.
-
Video
South Africa’s New International Data Transfer Rules: Tougher Than Europe’s?
Transferring personal information across borders is among the biggest compliance challenges for privacy professionals.
-
Video
COVID-19 and the Rise of Cybercrime in South Africa: How to Turn the Tide
Like with many countries worldwide, the COVID-19 pandemic has accelerated digital transformation in South Africa. Along with some social and economic benefits, the shift to remote work and online interactions has also spurred a rise in cybercrime that shows little sign of abating.
-
Video
Codes of conduct: Preparation, compliance and enforcement, with OneTrust
Codes of conduct are not a new concept, but have been a comparatively rarely used mechanism in the European privacy landscape.
-
Video
How to Avoid Sanctions Under the POPIA
South Africa now has one of the world’s leading data protection regimes. And along with strict rules on the processing and security of personal information, the POPIA brings large fines and even prison sentences for those who break the rules.
-
Webinar
The CISOs Role in Driving Trust: Why it Matters, How to Define it, and What Success Looks Like
Watch this session, The CISOs Role in Driving Trust: Why it Matters, How to Define it, and What Success Looks Like with OneTrust’s GRC Offering Lead. Gain insight on why more companies are naming chief trust officers, creating formalized trust initiatives, and measuring trust as a metric for themselves and their business partners.
-
Video
South Africa Cybercrimes Act: How Will the Law Impact South African Businesses?
South Africa’s Cybercrimes Act passed in May 2021 but has yet to come into force. The law creates new criminal offences for many cyber crimes, including hacking, ransomware, and cyber forgery.
-
Video
GDPR Compliant? The Extra Steps You’ll Need to Take to Comply with South Africa’s POPIA
The EU’s General Data Protection Regulation (GDPR) is often cited as the world’s toughest data protection law. Many organizations have worked hard to bring themselves into GDPR compliance.
-
Video
Keeping Calm and Compliant in the Face of Data Protection Uncertainty: A Conversation with Robert Baugh, CEO of Keepabl
GRC World Forums Analyst and Research Director Robert Bateman asked Robert Baugh, CEO of Keepabl, about his experiences working with UK data protection professionals over a turbulent few years professionals on keeping calm and compliant in this fast-changing and complex field
-
Webinar
Dynamic Data Discovery as the Foundation of your Privacy Program
Data discovery and mapping is the first step towards building an effective privacy program. But traditional data discovery is resource-intensive, static, and incomplete. Modern data discovery tools are rising to these challenges: always-on, secure, and deeply integrated with privacy management software. These advances open up exciting use cases like dynamic ROPAs and DPIAs. With the right approach, you can build efficiency and effectiveness for your legal and data teams.
-
Webinar
How OSINT can be used to investigate environmental crimes
In this webinar, we will shine a spotlight on environmental crime: one of the 22 crimes named in 6AMLD’s expanded list of predicate offences.
-
Webinar
When Good Data Goes Bad: How to Shine a Light on Sensitive, Toxic, and Risky Data
With numerous state-based (California, Virginia, Colorado….) privacy regimes now in place, the mishandling of sensitive data won’t be tolerated – by regulators or consumers. The challenge is: with mounting volumes of user created data under management, most of which is “dark”, how can you protect what you don’t even know you have?