All Webinars articles – Page 3
-
Webinar
When Good Data Goes Bad: How to Shine a Light on Sensitive, Toxic, and Risky Data
With numerous state-based (California, Virginia, Colorado….) privacy regimes now in place, the mishandling of sensitive data won’t be tolerated – by regulators or consumers. The challenge is: with mounting volumes of user created data under management, most of which is “dark”, how can you protect what you don’t even know you have?
-
Webinar
Operationalizing privacy: A key to legal defensibility for in-house Counsel
There was a time when a successful privacy program could only rely on documentation, checklists, spreadsheets, and emails. However, the complexity of today’s privacy concerns necessitates smarter, faster, and more scalable solutions, and the old programs must become pragmatic.
-
Webinar
The Art of Innovating Securely in The Cloud
As the threat and regulatory landscape continues to evolve, along with the acceleration in remote working and access to data, how do you protect your most prized assets, whilst growing innovatively and securely, and delivering a seamless customer experience?
-
Webinar
Why your law firm needs to layer your email security in Microsoft 365 for maximum protection
Risks to your law firms’ email security have never been greater. With remote work still as popular as ever and an explosion in digital transformation projects, there is an increase in the risks of outbound data loss. In fact, we know that 85% of law firms using Microsoft 365 had an email data breach in the last 12 months.
-
Webinar
Not All Assurances are Created Equal – Assessed Entities and Relying Parties Beware!
With the cyber threat landscape constantly evolving, and the number and complexity of business-vendor relationships continuously growing, there is an increasing market need for reliable assurances.
-
Webinar
Employee DSARs: The Coming Deluge
Up until now, organizations have assumed that all data subject requests were the same.
-
Webinar
Do You Know What Your Ransomware Readiness Score Is?
It’s not a matter of if, but when. Ransomware incidents are on the rise and it is crippling companies. But there are key things you can and should be doing to prevent and recover in the event of a ransomware attack.
-
Webinar
Handling Tricky Employee Subject Access Requests
Being able to respond effectively to subject access requests (SARs) can be challenging, especially when they are complex requests from current or former employees.
-
Webinar
Future Proofing Your Privacy Program
Standing up and fortifying your company’s privacy program is serious business, particularly when new (and varying) privacy laws keep getting added to the books, and your day job to-do list isn’t getting any shorter.
-
Webinar
Where are you on the Data Provisioning Maturity Model?
The data provisioning maturity model acts as both a measuring stick and common framework for organizations to help illustrate what is needed to understand and ultimately improve their data protection program.
-
Webinar
OneTrust GRC: Building a GRC Program That Fits Your Business | A First Line Friendly ISMS Suite
How much time do you spend transferring data across systems to execute your GRC program? Oftentimes, disparate systems across policy, privacy, IT risk, vendor risk, incident, and audit result in duplicated data across applications.
-
Webinar
Cyber Threats: Protect your remote employees
During COVID-19, 91% of financial services organisations reported an increase in outbound email traffic.
-
Webinar
US Data Privacy: Latest Regulations and Implementing Compliant and Defensible Practices
State-level momentum for comprehensive privacy bills is at an all-time high. After the California Consumer Privacy Act passed, multiple states proposed similar legislation to protect consumers in their states.
-
Webinar
The Conversation Continues: Where International Data Transfers Stand
You may sometimes get the feeling no progress is being made to solve the issue of transferring personal data from the European Union to other countries around the world. After the draft EDPB Recommendations and draft model Standard Contractual Clauses, no major changes have been communicated.
-
Webinar
Addressing Sector Challenges in Data Privacy, Compliance, and Security
Over the past few years, new services and increased connectivity have made the financial services industry quicker and more agile.
-
Webinar
Recovering Fast from Ransomware attacks
Ransomware has been blasting news feeds on a daily basis for years. Each article details the story of an organisation that can no longer access their business critical data.
-
Webinar
The Crucial Challenges Every Organisation Must Address
Changing legislation and increased risk from lawsuits from inadequate incident and breach management processes is a challenge for every General Counsel in 2021.
-
Webinar
Using FTK Imager: The Free Forensic Imaging Tool
Forensic imaging is essentially a ‘scene of crime’ process for digital information preservation. Decisions made while imaging can affect the entire investigation and could make or break your case.
-
Webinar
Data Retention and Records Management Under the CPRA
While the CCPA doesn’t explicitly address data retention and data minimization practices, California voters chose to expand their rights by passing the California Privacy Rights Act (CPRA) in November of 2020, which fills in those data retention and minimization gaps.
-
Webinar
Improving Outcomes with Informatics Powered by Safe Data
Health organizations are working hard to safely leverage patient data across the care continuum to improve outcomes.
- Previous Page
- Page1
- Page2
- Page3
- Page4
- Next Page