All PrivSec Global articles – Page 15
-
Video
Building a Risk Management Framework for the Future
Managing risk is at the heart of any data protection programme and building a strategy which can navigate changes in market and business strategy is crucial.
-
Video
Identifying Risky Vendors: 7 Warning Signs You Shouldn’t Ignore
For individuals managing third-party risk, there is one primary question that needs answering: Are your vendors safe to do business with?
-
Video
Using Security as a Tool to Build Competitive Edge
Security functions in some leading organisations are beginning to move beyond just their role as defence mechanism and are defining the role they can play in contributing to the overall strategic vision.
-
Video
Financial Data and the Ethical Issues of Technical Innovation
Financials services is one of the most innovative sectors in they way organisations source and use information and this creates multiple challenges for data protection professionals - this panel discusses the practical issues in creating an ethical strategy.
-
Video
Embedding Security and Risk Management into Your Organisation
Cyber security plays a critical role in helping digital businesses to flourish.
-
Video
Best practice advice on data sharing requests policy
The regulatory regimes across the Middle East and North Africa are going through a stage of rapid development and alignment, creating challenges for companies doing business across the region.
-
Video
Why It’s Time to Rethink Your Approach to Data Classification
How can enterprises know their data in a fragmented data landscape of diverse data formats, schemas, content, and metadata types? Why haven’t we solved the classification conundrum - and how can security and privacy teams lead the charge for next-generation classification?
-
Video
The Zero Trust Model - Securing Your Sensitive Data
Speaker Panel The Zero Trust Model - Securing Your Sensitive Data Video: The Zero Trust Model - Securing You…
-
Video
Data Discovery: What Skeletons are Hiding in Your Unstructured Data?
With the ever-increasing use of data and number of digital threats to organisations, data breaches are unfortunately commonplace.
-
Video
What Does a Successful Data Access Governance Programme Look Like?
Strong walls only get you so far – the nature of a best practice approach to data access governance is to increase the focus on how data is controlled internally.
-
Video
Data Discovery: What Skeletons are Hiding in Your Unstructured Data
Unstructured data is a compliance risk. Examples of this type of data can include the content of email messages and spreadsheets through to business plans and intellectual property.
-
Video
Business resilience and continuity in a time of uncertainty
Business continuity planning allows organisations to respond, resume and restore operations in the event of disruptions.
-
Video
Jeff Lanza on Cybercrime: Strategies to Prevent, Protect and Prevail
From computer intrusions to ransomware, a 20-year veteran FBI special agent and cyber security expert traces the evolution of the cybercrime “pandemic” and provides countermeasures to combat the global threat.
-
Video
Engaging the board: How your board can be ready for crisis
Engaging the board is an ongoing challenge in cyber security for a variety of reasons: what seems like a uniquely technical issue is actually a complex business risk present across different business functions.
-
Video
Best Practice for Incident Response
Effective incident response is a key component of being able to contain and respond to a breach.
-
Video
The road to operationalizing security and privacy visibility and controls
KeyBank’s compliance transformation: The road to operationalizing security and privacy visibility and controls
-
Video
Investing in Your People: The Value of Security Awareness and Engagement
The best way to secure your network and keep your data safe is to invest in your employees.
-
Video
Building Your Security Dream Team
How can you guarantee that your security team has the right skills and resources to implement your cyber security plan?
-
Video
Implementing a Robust Data Protection Program
Building and maintaining strong data protection strategies faces specific challenges for organisations working in the Middle East and North Africa region.
-
Video
How Diversity Can Enable Organisations to Combat Security Risks
A diverse cybersecurity team is critical to generating ideas and processes needed to confront security risks.