All Privacy Intelligence articles – Page 21
-
Video
Using Technology to Build User Trust Through Data Transparency and Control
Speaker Panel Using Technology to Build User Trust Through Data Transparency and Control Video: Simplifying Privacy Compliance - Using Technology to Build User Trust Through Data Transparency and Control
-
Video
Consumer Trust, Consent and Privacy Rights
From “fake news” to election tampering, the political and ethical aspects of advertising technology have rarely been more publicly debated.
-
Video
Your Privacy Awareness Training Program
Your staff are both your biggest weakness and strength. If your employees don’t know how to handle data at your organization compliantly, it could have an impact on reputation and resources.
-
Video
US Privacy Laws - State-Level Approaches to Data Privacy
The development of state-level regulation on data protection is likely to upend the current paradigm relationship between individuals and private business – we review the regulatory direction of travel and what the next two years are likely to bring.
-
Video
Protecting Data and Ensuring Compliance Posture in the Hybrid Work Environment
We have seen two years’ worth of digital transformation in only a few months. Most of Microsoft’s enterprise customers (and even Microsoft itself!) had to quickly transform the way they assess new and complex risks in the wake of remote work.
-
Video
Schrems II and Beyond: the Future of Data Transfers
The case brought by activist lawyer Max Schrems to the European Court of Justice has shaken up the foundation for the legal transfer of data between the EU and US with global ramifications.
-
Video
Artificial Intelligence Data Privacy & Cyber Security Assurance
The region’s economic growth and technical innovation over the last two decades has resonated through almost all industries but what will the coming years bring in terms of APAC’s influence over AI, privacy and security?
-
Video
To Trust, or Not to Trust the Cloud That is Your Compliance and Risk Question
Many organizations struggle with digital transformation and cloud computing, particularly when implementing a framework to meet their compliance requirements.
-
Video
Edgar Perez in Conversation
One of the world’s foremost experts on how organisations can harness bleeding edge technologies to give themselves competitive edge, Edgar Perez will share his insights into how the world’s leading companies are changing their business models to leverage technical change.
-
Video
Staying Competitive while Maintaining Global Regulatory Compliance
From managing risk to creating edge: how data protection practitioners are helped to build competitive advantage for their organisations.
-
Video
Best practice advice on data sharing requests policy
The regulatory regimes across the Middle East and North Africa are going through a stage of rapid development and alignment, creating challenges for companies doing business across the region.
-
Video
Why It’s Time to Rethink Your Approach to Data Classification
How can enterprises know their data in a fragmented data landscape of diverse data formats, schemas, content, and metadata types? Why haven’t we solved the classification conundrum - and how can security and privacy teams lead the charge for next-generation classification?
-
Video
The Zero Trust Model - Securing Your Sensitive Data
Speaker Panel The Zero Trust Model - Securing Your Sensitive Data Video: The Zero Trust Model - Securing You…
-
Video
What Does a Successful Data Access Governance Programme Look Like?
Strong walls only get you so far – the nature of a best practice approach to data access governance is to increase the focus on how data is controlled internally.
-
Video
Data Discovery: What Skeletons are Hiding in Your Unstructured Data
Unstructured data is a compliance risk. Examples of this type of data can include the content of email messages and spreadsheets through to business plans and intellectual property.
-
Video
Business resilience and continuity in a time of uncertainty
Business continuity planning allows organisations to respond, resume and restore operations in the event of disruptions.
-
Video
The road to operationalizing security and privacy visibility and controls
KeyBank’s compliance transformation: The road to operationalizing security and privacy visibility and controls
-
Video
Investing in Your People: The Value of Security Awareness and Engagement
The best way to secure your network and keep your data safe is to invest in your employees.
-
Video
Implementing a Robust Data Protection Program
Building and maintaining strong data protection strategies faces specific challenges for organisations working in the Middle East and North Africa region.
-
Video
The Biggest Challenges for Indian Data Protection Professionals in 2021
From the coronavirus pandemic to changing regulation in the region, India faces special challenges over the coming year.