All Privacy Intelligence articles – Page 22
-
Video
Artificial Intelligence Data Privacy & Cyber Security Assurance
The region’s economic growth and technical innovation over the last two decades has resonated through almost all industries but what will the coming years bring in terms of APAC’s influence over AI, privacy and security?
-
Video
To Trust, or Not to Trust the Cloud That is Your Compliance and Risk Question
Many organizations struggle with digital transformation and cloud computing, particularly when implementing a framework to meet their compliance requirements.
-
Video
Edgar Perez in Conversation
One of the world’s foremost experts on how organisations can harness bleeding edge technologies to give themselves competitive edge, Edgar Perez will share his insights into how the world’s leading companies are changing their business models to leverage technical change.
-
Video
Staying Competitive while Maintaining Global Regulatory Compliance
From managing risk to creating edge: how data protection practitioners are helped to build competitive advantage for their organisations.
-
Video
Best practice advice on data sharing requests policy
The regulatory regimes across the Middle East and North Africa are going through a stage of rapid development and alignment, creating challenges for companies doing business across the region.
-
Video
Why It’s Time to Rethink Your Approach to Data Classification
How can enterprises know their data in a fragmented data landscape of diverse data formats, schemas, content, and metadata types? Why haven’t we solved the classification conundrum - and how can security and privacy teams lead the charge for next-generation classification?
-
Video
The Zero Trust Model - Securing Your Sensitive Data
Speaker Panel The Zero Trust Model - Securing Your Sensitive Data Video: The Zero Trust Model - Securing You…
-
Video
What Does a Successful Data Access Governance Programme Look Like?
Strong walls only get you so far – the nature of a best practice approach to data access governance is to increase the focus on how data is controlled internally.
-
Video
Data Discovery: What Skeletons are Hiding in Your Unstructured Data
Unstructured data is a compliance risk. Examples of this type of data can include the content of email messages and spreadsheets through to business plans and intellectual property.
-
Video
Business resilience and continuity in a time of uncertainty
Business continuity planning allows organisations to respond, resume and restore operations in the event of disruptions.
-
Video
The road to operationalizing security and privacy visibility and controls
KeyBank’s compliance transformation: The road to operationalizing security and privacy visibility and controls
-
Video
Investing in Your People: The Value of Security Awareness and Engagement
The best way to secure your network and keep your data safe is to invest in your employees.
-
Video
Implementing a Robust Data Protection Program
Building and maintaining strong data protection strategies faces specific challenges for organisations working in the Middle East and North Africa region.
-
Video
The Biggest Challenges for Indian Data Protection Professionals in 2021
From the coronavirus pandemic to changing regulation in the region, India faces special challenges over the coming year.
-
Webinar
Acting on Brexit and Schrems II
There are 2 things on the minds of European privacy pros that have nothing to do with the pandemic: Brexit and Schrems II.
-
ebook
Rethinking Data Protection: The Human-centric Approach
The truth about traditional data security. Traditional cybersecurity was hinged on event-centric responses: Build a wall at the perimeter, control what passes in and out through that wall, and respond when something suspicious happens.
-
Video
Tackling Local and Global Regulations with Microsoft Compliance
Join this session with Microsoft where they will discuss Tackling Local and Global Regulations with Microsoft Compliance.
-
Webinar
Privacy in the Boardroom: The Metrics, KPIs and Reporting You Need
Stakeholder support for a privacy program is key, especially as compliance programs grow and organizations focus their attention on an increasing number of regulations and frameworks from around the world.
-
Webinar
Data Retention & Minimisation: Lessons Learned in 2020
Data retention and minimisation played a key role in numerous cases and enforcement actions throughout 2020. Worryingly, the range of infractions varied widely, teaching us that it is certainly an area that is very challenging for organisations to address.
-
ebook
Privacy Management Solution Buyer’s Guide
A privacy solution is the backbone of a solid privacy program, and choosing the right one for your particular business can be confusing and overwhelming at times.