All articles by PrivSec Global – Page 4
-
Video
Risk Assessments of Fast-Tracked Digital Transformation and the Importance of Back-up
Digital transformation is happening rapidly, but businesses have to be extra careful not to put their digital assets at risk.
-
Video
Third Party Risk Management - Ownership and Centralized Risk Assessment Exchanges
Third party providers and suppliers sometimes have access to your organisation’s intellectual property, data, financial, and other sensitive information and custom details. Managing this risk can be complex and onerous.
-
Video
Why the Future of Trust Must Be Built on Data Transparency
As organizations invest more in Data Protection & Privacy, and regulators increase their scrutiny, this is a perfect moment in time for increased data transparency.
-
Video
What Happens After Third Party Cookies?
The death of the third-party cookie has been widely reported, but what comes next? Rising consumer expectations and changing legislation has meant that the global privacy ecosystem is quickly evolving.
-
Video
President Biden’s Executive Order on Cybersecurity’s Impact to the Software Industry
On May 12, 2021 U.S. President Joe Biden published a wide-ranging executive order aimed at strengthening the UnitedStates’ cybersecurity. With the backdrop of recent high-profile cyber breaches impacting U.S. companies and critical infrastructure, the executive order is already too late but aims to prevent similar attacks in the future.
-
Video
Trust: The Children’s Code – Insight and Design at the Heart of Compliance
The privacy regulators have a message for brands – unless you can prove otherwise, you must assume that children – people under the age of 18 years old – are using your digital products and services.
-
Video
Business Through the Prism of Cyber
When integrating a new technology into your organization, engaging in or trying to mitigate third party risk, one must think of its cyber hygiene. It starts with understanding where your vulnerabilities are, and how you can efficiently manage it
-
Video
IT vs OT: Is There Too Much Operational Technology Online for Hackers?
The attack on the Colonial Pipeline was one of the most major hacks in the history of critical infrastructure. But, this was not a hack on Colonial Pipeline’s IT, but their Operational Technology. The pipeline, which normally carries 2.5m barrels a day, is digital in terms of its operations.
-
Video
Are you ignoring the elephant in the room - Your Organization’s Data?
Everyone is talking about compliance and fines when it comes to an organization’s data. Fines must not be the driving factor to take control of your data. It must start with Trust.
-
Video
Schrems II and International Data Transfers: The Journey to a new Privacy Shield and Who Is Leading the Way
Companies are still feeling the impact of the European Court of Justice decision last July that torpedoed the Privacy Shield, raising huge question marks about the future of international data transfers between the EU and US.
-
Video
Women and Diversity in Cybersecurity: Why Are We Still Having this Conversation?
Recent research by Tessian found that a higher proportion of young men were likely to consider a career in cyber security than young women.
-
Video
Environmental, Social, and Corporate Governance: Why a Privacy-Focused Company is a Sustainability-Focused Company
Holding less data means less storage, less power usage and this is better for the environment. In short, be lean with data, less power, more profit, better for the environment.
-
Video
Regulatory Developments: POPIA and the Principles of Enforcement Action
South Africa’s Protection of Personal Information Act (POPIA) comes into enforcement from 1st July 2021.
-
Video
Third Party Risk Management under GDPR: Ownership and Risks, Fines and Solutions
Data breaches via third parties are a growing problem for GDPR compliance.
-
Video
Data Privacy and Integrated Technologies
The rapid development of new technology presents organisations, regulators and society with data privacy and security risks. In our interconnected world, personal data can be shared between devices, networks and borders rapidly.
-
Video
Effective Zero Trust: How Zero Trust Can Help Secure Your Business
Zero trust can deliver greater security, less demanding workloads, reduced IT complexity and can be used to improve data protection and user experience.
-
Video
Engaging Your Line of Business for Cybersecurity Initiatives
Security cannot be done in a silo. The extent and nature of data shared across line of business functions both internally and externally fuels instances of system and organizational vulnerabilities.
-
Video
GDPR Requirements and Digital Transformation
Digital technology is transforming the way businesses operate around the world and data has never been able to be shared so quickly and easily in real time. However, the General Data Protection Regulation requires data usage to be lawful, fair and transparent, with strict requirements to minimise and limit the purpose of data.
-
Video
How to Prevent Credential Stuffing Attacks While Managing Risk and Trust
Credential stuffing is a brute force attack that can be low-risk, high-reward for cyber criminals. This panel will debate the defence techniques that can be used to guard against this threat.
-
Video
Internal Threats: Top Threats to your IT Security and how to Address Them
From employees accidentally clicking on malicious links, to sabotage, theft of data and unauthorised access, companies have plenty of potential insider cyber security threats to consider.