All articles by PrivSec Report – Page 5
-
Webinar
Building an Insider Threat Program for your Organization
Cybersecurity measures are often focused on threats from outside an organization rather than threats posed by individuals inside an organization.
-
Webinar
Scaling Data Governance in Line with Business Growth
Strong data governance involves getting the right people, processes and technologies in place that are needed to manage and protect the organisations data assets. It forms the basis for effective Legal GRC practices and makes the efficient use of trustworthy data possible.
-
News
CJEU ruling poses threat to UK adequacy decision post-Brexit
The Court of Justice of the European Union (CJEU) yesterday ruled that the scope of European fundamental rights to privacy, data protection and freedom of expression extends to mass data retention and collection for national security purposes.
-
Article
Police confirm sex crime victims’ data leaked by Greater Manchester Police in test gone wrong
Highly sensitive data including the names and addresses of thousands of victims was accidentally leaked by Greater Manchester Police (GMP), police confirm.
-
Webinar
The Glass House: anonymity and data exposure in an AI world
All organizations live in a Glass House. From ISP’s to content delivery networks to website advertising, all commercial internet activity is being tracked, collected and monetized by a highly-automated data broker marketplace.
-
Article
Belgian DPA asks EU court for permission to take regulatory action against Facebook
The Belgian Data Protection Authority (DPA) will be appearing at the Court of Justice of the European Union (CJEU) in Luxemburg today in a bid to gain regulatory action against Facebook.
-
News
New mechanism for EU data transfers ‘may be ready by Christmas’
A revised mechanism for transferring EU data outside of the EU may be ready by Christmas, according to the EU’s digital chief.
-
Webinar
Navigating Global Privacy Laws Along the IT Asset Lifecycle
As if cyberthreats weren’t enough, consumer privacy laws have put increased pressure on IT leaders to keep personal or sensitive data from being breached. This includes mandates to immediately and thoroughly respond to data deletion requests, data retention expirations, and other cases of no-longer-needed data across your entire data ...
-
Webinar
The Balancing Act: Productivity, Collaboration and Data Protection
Join Microsoft for a deep dive on how you can use intelligent and built-in solutions to identify, label and protect sensitive data without impeding collaboration, even in an environment of remote work. We will follow the journey of an organization as individual workers collaborate on a patent pending project ...
-
Feature
Ensuring security in the journey towards digital healthcare
There are more digital touchpoints in the healthcare systems we experience today than ever before.
-
Webinar
Safely Unleash the Value of Sensitive Data in the Cloud
Organizations are leveraging the Cloud to maximise the value of data, consolidating it in data lakes and committing to analytics and machine learning initiatives to convert it into actionable insights. As analysts and data scientists have started working with these tools it has become clear that to provide accurate ...
-
Q&A
Facing up to the cyber security challenge
James Eaton-Lee, head of information security and data protection officer at Oxfam, discusses the cyber threats and challenges facing third sector organisations tackling poverty, equality and democratic disempowerment.
-
News
Zerologon vulnerability actively exploited, says Microsoft
Microsoft has observed attacks exploiting the serious security flaw dubbed “Zerologon”, the company’s security intelligence team reported in a tweet yesterday.
-
Q&A
DIFC’s data protection landscape: aligning global measures
As the region approaches the end of the DIFC Data Protection Law transition period, PrivSec spoke with Mohammad Khalaf, Senior Regulatory Compliance Officer at Arab Bank in Jordan to discuss the significance of the new law.
-
ebook
How Businesses Can Meet CCPA Compliance Requirements
The California Consumer Privacy Act (CCPA) is a California state statute intended to enhance California residents’ privacy rights.
-
Webinar
The Legal GRC Landscape Today, and Tomorrow
According to Exterro’s recent 2020 Corporate Legal Leaders Survey, 7-in-10 Legal Departments are managing their data related problems by sharing technology to manage litigation, data privacy, compliance, and cybersecurity – all of which represent a new encompassing business landscape of Legal GRC (Governance, Risk and Compliance).
-
Feature
Three things to consider when securing multi-cloud environments
Public sector organisations are all at different points on the cloud transformation and digitalisation journey.
-
Webinar
How to align infosec, data governance and employees to deliver stronger data governance and security
Getting a grip on unstructured data causes headaches because it’s so hard to get visibility of - and you simply can’t secure what you don’t know you’ve got.
-
ebook
Mid-Year CCPA Trends Report 2020
Now that the July 1st enforcement date for the California Consumer Privacy Act (CCPA) has come and gone, the question on every business’s mind is, “How many Data Subject Requests (DSRs) should I expect to receive?”