All PrivSec Global articles – Page 7
-
Video
What Happens After Third Party Cookies?
The death of the third-party cookie has been widely reported, but what comes next? Rising consumer expectations and changing legislation has meant that the global privacy ecosystem is quickly evolving.
-
Video
President Biden’s Executive Order on Cybersecurity’s Impact to the Software Industry
On May 12, 2021 U.S. President Joe Biden published a wide-ranging executive order aimed at strengthening the UnitedStates’ cybersecurity. With the backdrop of recent high-profile cyber breaches impacting U.S. companies and critical infrastructure, the executive order is already too late but aims to prevent similar attacks in the future.
-
Video
Trust: The Children’s Code – Insight and Design at the Heart of Compliance
The privacy regulators have a message for brands – unless you can prove otherwise, you must assume that children – people under the age of 18 years old – are using your digital products and services.
-
Video
Business Through the Prism of Cyber
When integrating a new technology into your organization, engaging in or trying to mitigate third party risk, one must think of its cyber hygiene. It starts with understanding where your vulnerabilities are, and how you can efficiently manage it
-
Video
IT vs OT: Is There Too Much Operational Technology Online for Hackers?
The attack on the Colonial Pipeline was one of the most major hacks in the history of critical infrastructure. But, this was not a hack on Colonial Pipeline’s IT, but their Operational Technology. The pipeline, which normally carries 2.5m barrels a day, is digital in terms of its operations.
-
Video
Are you ignoring the elephant in the room - Your Organization’s Data?
Everyone is talking about compliance and fines when it comes to an organization’s data. Fines must not be the driving factor to take control of your data. It must start with Trust.
-
Video
Schrems II and International Data Transfers: The Journey to a new Privacy Shield and Who Is Leading the Way
Companies are still feeling the impact of the European Court of Justice decision last July that torpedoed the Privacy Shield, raising huge question marks about the future of international data transfers between the EU and US.
-
Video
Women and Diversity in Cybersecurity: Why Are We Still Having this Conversation?
Recent research by Tessian found that a higher proportion of young men were likely to consider a career in cyber security than young women.
-
Video
Environmental, Social, and Corporate Governance: Why a Privacy-Focused Company is a Sustainability-Focused Company
Holding less data means less storage, less power usage and this is better for the environment. In short, be lean with data, less power, more profit, better for the environment.
-
Video
Regulatory Developments: POPIA and the Principles of Enforcement Action
South Africa’s Protection of Personal Information Act (POPIA) comes into enforcement from 1st July 2021.
-
Video
Third Party Risk Management under GDPR: Ownership and Risks, Fines and Solutions
Data breaches via third parties are a growing problem for GDPR compliance.
-
Video
Data Privacy and Integrated Technologies
The rapid development of new technology presents organisations, regulators and society with data privacy and security risks. In our interconnected world, personal data can be shared between devices, networks and borders rapidly.
-
Video
Effective Zero Trust: How Zero Trust Can Help Secure Your Business
Zero trust can deliver greater security, less demanding workloads, reduced IT complexity and can be used to improve data protection and user experience.
-
Video
Engaging Your Line of Business for Cybersecurity Initiatives
Security cannot be done in a silo. The extent and nature of data shared across line of business functions both internally and externally fuels instances of system and organizational vulnerabilities.
-
Video
How to Prevent Credential Stuffing Attacks While Managing Risk and Trust
Credential stuffing is a brute force attack that can be low-risk, high-reward for cyber criminals. This panel will debate the defence techniques that can be used to guard against this threat.
-
Video
Internal Threats: Top Threats to your IT Security and how to Address Them
From employees accidentally clicking on malicious links, to sabotage, theft of data and unauthorised access, companies have plenty of potential insider cyber security threats to consider.
-
Event
Michelle King delivers keynote at PrivSec Global on cultures of equality within organisations
Michelle King, Managing Director of Equality Forward, former Director of Inclusion at Netflix and leading global expert in gender equality, discusses how workplaces need to adapt to embrace a culture of equality.
-
Event
Third Party Risk Management under the microscope at PrivSec Global
PrivSec Global’s second day got underway this morning with an exploration of third party risk management.
-
Event
PrivSec Global deep-dives into Vaccine Passes
At PrivSec Global today, a panel of experts explored the technology and the importance of vaccine passes to our world in this new normal.
-
Event
Ciaran Martin delivers keynote at PrivSec Global
At PrivSec Global today, Ciaran Martin, founding CEO of the National Cyber Security Centre, discussed ransomware.