All PrivSec Global On-Demand articles – Page 3
-
Video
Data Retention Policies: Balancing Privacy and Business Needs [Sponsored by Exterro]
The presentation will cover key topics, including the legal and regulatory landscape surrounding data retention, the importance of privacy in data management, and the potential risks and consequences of inadequate data retention policies. We will also discuss the various factors organizations need to consider when developing data retention policies, such as data type, storage duration, access controls, and data destruction.
-
Video
Privacy, Security and Digital Policy Update: Asia Pacific
Many countries throughout the Asia Pacific (APAC) region are updating or implementing data protection and security regulations. The importance of the APAC economy means these laws will have a serious impact on any business operating in the region.
-
Video
Privacy, Security and Digital Policy Update: Africa
This session will explore the exciting data protection and security legal landscape across Africa, where new laws with complex and varying requirements are developing fast.
-
Video
Privacy, Security and Digital Policy Update: Middle East and North Africa [Sponsored by Exterro]
Our panel will give an update on the latest data protection and security developments in the MENA region, identifying the most important legal developments and their implications for businesses operating in the region.
-
Video
GDPR Five Years On: How Has Data Protection Changed? [Sponsored by Sypher]
Over half a decade since the GDPR took effect, our panellists will debate the biggest impacts of the EU’s best-known regulation.
-
Video
EU Security Compliance: Cyber Resilience Act, NIS 2 and Beyond
Upcoming EU cyber security regulations could impact businesses of all sizes and sectors across Europe.
-
Video
Privacy, Security and Digital Policy Update: UK [Sponsored by OneTrust]
The UK government repeatedly namechecks data protection as one area in which the country could capitalise on its departure from the EU. But opinions vary as to whether the reform proposals will be effective or meaningful.
-
Video
How to measure the effectiveness of your privacy program [Sponsored by Privacy Culture]
It is crucial to have an effective privacy program in place that can ensure compliance with regulations, manage privacy risks, and build trust with customers and stakeholders. After 5 years of GDPR, measuring the effectiveness of your privacy program continues to be a complex and challenging task as privacy professionals argue that they face various challenges when it comes to measuring privacy effectiveness.
-
Video
Subject Access Requests: Respecting Data Rights While Saving Time and Resources [Sponsored by Zivver & OneTrust]
This session will focus on creating a streamlined approach to data governance that allows for timely and comprehensive responses to subject access requests.
-
Video
Leveraging Data in your Ethics and Compliance Programs
Ethics and compliance programs have more data available to them than ever before. Capturing data on program activity and impact can be a powerful tool to assess whether your ethics and compliance program works in practice. Many companies also find value in benchmarking their programs against industry norms and in response to risks. That said, data’s nascency in the ethics and compliance space means we are still struggling to understand what to do with all this data, and how to know what it is telling us.
-
Video
Children’s Privacy: Steps Towards a Less Data-Hungry Web for Kids
Regulators worldwide are getting serious about children’s privacy. From the “children’s codes” established in jurisdictions like the UK and Califorina, to the recent enforcement action against Instagram and TikTok—it’s becoming increasingly clear that the web is likely to change so that children are better protected.
-
Video
Privacy Risk Assessments in the US: Why, When, and What?
A standard practice from other global privacy laws has hit the US: privacy risk or data protection assessments (commonly known as PIAs) are now required under certain criteria for the processing of personal data in all new state laws, except Utah. Beyond regulatory compliance, a comprehensive and integrated assessment program embeds privacy by design into your organization’s data strategy and enables you to manage risk at scale.
-
Video
Should Data Protection Experts Also Be AI Experts?
AI is advancing fast, and playing an increasingly important role in many organisations’ operations and business models.
-
Video
Insider Threats and Accidental Disclosure: The Biggest Causes of Data Breaches?
Much of the work of security professionals focuses on securing an organisation’s perimeter and keeping malicious actors out. But one of the most significant threats to privacy and security is accidental disclosure of data by employees.
-
Video
OT and IT: Differences, Controls, and Key Integration Points
We all know IT - the laptops, phones, applications, and cloud applications we use at work and home, that manage information. Systems that run industrial systems – electric utilities, gas pipelines, water systems, and manufacturing plants – are Operational Technology (OT).
-
Video
Unifying Privacy Management and Information Security Compliance: Building a Bridge to Improved Efficiency
The work of privacy and security professionals looks quite different day-to-day. But these two disciplines share a lot in common, and there are areas where working in silos does not best serve the interests of employees, organisations or even users.
-
Video
That’s The Way The Third-Party Cookie Crumbles: The Future of Online Marketing
As a sector, digital marketing has long been beset by compliance issues and has been subject to a great deal of high-profile enforcement action.
-
Video
Managing Third-Party Risk: The Role of Data Protection and Privacy Professionals
Organisations find themselves working with an ever-larger network of third-party companies. And much of the work of managing these third parties falls to privacy professionals: from preventing data breaches to drawing up data processing agreements and facilitating international data transfers.
-
Video
Who Would be a Chief Privacy Officer? Pressures, Workflow and Future Trends in the Role
The role of Chief Privacy Officer (CPO) has existed since the early 90s, but CPOs have become increasingly commonplace as companies use more personal data in increasingly innovative—and sometimes risky—ways.
-
Video
Security Lessons From the Year’s Biggest Hacks
Every year, high-profile security incidents make headlines—and 2022 has been no exception.