All Security articles
-
Webinar
Evaluating Your Most Systemic Risk: Dysfunctional Risk Management Practices
Webinar produced by GRC World Forums in association with OneTrust
-
Webinar
Taming the Regulatory Whirlwind: Data Privacy, Security, and Collaboration
Webinar produced by GRC World Forums in association with DualityTech
-
Webinar
Why Healthcare Organizations Need Modern IAM Solutions
Webinar produced by GRC World Forums in association with ManageEngine
-
Webinar
What Comes Next After A Data Breach
While the global average cost of a data breach has increased to $4.24 million, the total cost isn’t just in data loss alone.
-
Webinar
Leapfrog from SA&T compliance-as-a-strategy, to actual behavior & culture change
Security remains plagued with the legacy of compliance-driven, security awareness & training tools and methods.
-
Webinar
Data Retention - The blind spot in your privacy program (MEA region)
The increasing number and complexity of privacy laws have been the driving force for organisations to shift focus from tick-the-box compliance exercises to automated privacy solutions.
-
Webinar
ISO 27001: What is changing and how it will impact you
Becoming ISO 27001 certified demonstrates that your Information Security Management System (ISMS) is aligned with documented standards and provides your customers with assurance regarding the security of these systems.
-
Webinar
After the attack: Mitigating Organisational Impact of a Data Breach? (LATAM region)
After the attack: Mitigating Organisational Impact of a Data Breach?
-
Webinar
Solving Data Mapping with a no-code and automated approach to keep up with ever-increasing data sources and SAAS
Data volumes are increasing exponentially, and companies need seamless and trustworthy technology that will enable them to keep track of their data sources and know what PII is there.
-
News
Cyber Security Hub @ #RISK
#RISK – Europe’s Leading Risk-Focused Expo: November 16 & 17, ExCeL, London
-
Webinar
How Successful Security Teams Manage Risk to Build Trust & Drive Growth
Abundant data is now available to put numbers behind what we instinctively know: trusted organizations are more successful. InfoSec teams have a prominent role in helping their organization become trusted, and therefore more successful: first and foremost, by communicating changes in the IT & security risk posture.
-
Webinar
Data Control: How IT and Security leaders are driving innovation in data privacy and governance
Data privacy isn’t just a challenge for your Legal team. IT and Security leaders are spearheading innovation: elevating data control as the key to scalable and future proof privacy compliance, providing the platform to manage risk, and collaborating with marketing and data teams to ensure data supports growth initiatives.
-
Webinar
Wait a minute, whose data is that?! Uncovering your biggest data governance, security and privacy risks
In order to establish effective governance, privacy, or security programs, you first need to truly understand your data. What data do you store? Who owns it? Where is it located? Who has access to it? What regulations apply to it? Can you quickly and easily respond to data requests? Without a robust data inventory and understanding these types of questions, there is a limited chance of success achieving any Legal GRC objective.
-
Sponsored
OneTrust’s Scott Bridgen tells How Successful Security Teams Manage Risk to Build Trust and Drive Growth
Scott Bridgen serves as Head of GRC at OneTrust, the world’s most widely used privacy, security, and trust technology platform.
-
ebook
Executive Summary: ICS/OT Cybersecurity Year In Review 2021
Get what you need to know quickly to protect your critical assets by reading the Executive Summary of the 2021 ICS/OT Year in Review.
-
Webinar
New Dawn in Compliance: Moving Compliance Functions from Defense to Offense
Banks spend 250B USD on AML while only catching 1% of the proceeds from money-laundering which amounts to over 2.5 trillion USD every year. How can we move the needle and help banks protect themselves through the use of technology?
-
Webinar
Confident Breach Readiness: Why Log4j Highlights the Urgency of Data Encryption
As evidenced by the Log4j vulnerability, cyber attacks and data breaches are escalating in frequency, scope, and sophistication. Cyber attacks have now become a guarantee, especially for large organizations. How can enterprise technology leaders remain confident in their security posture when networks and systems are at risk of being compromised?
-
Sponsored
An Interview with Linda Thielová, Head of Privacy CoE, DPO at OneTrust
Linda Thielová serves as Head of Privacy CoE, DPO at OneTrust, the world’s most widely used privacy, security, and trust technology platform.
-
Webinar
When Good Data Goes Bad: How to Shine a Light on Sensitive, Toxic, and Risky Data
With numerous state-based (California, Virginia, Colorado….) privacy regimes now in place, the mishandling of sensitive data won’t be tolerated – by regulators or consumers. The challenge is: with mounting volumes of user created data under management, most of which is “dark”, how can you protect what you don’t even know you have?
-
ebook
It’s Time to Take the Ransomware Threat to Business-Critical Applications More Seriously
Almost every day, we see yet another case of ransomware. While, historically, companies of all sizes are targeted, recently it appears that all the news revolves around debilitating attacks on mission-critical or business-critical systems of large enterprises — from fuel and energy companies to food processing companies.