Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Regulatory Spotlight on Strengthening Information Security & Privacy Black Kite CSO, Bob Maley, & CEO of Solem Risk Partners LLC, Linnea Solem What's New for 2022? How has the regulatory landscape changed in the last 3 years for third-party risk management? Hear from Linnea Solem and Bob Mal... 2 days ago | 34 mins Security Briefings Part 2: Compliance Checkup - GLBA & the Cloud Jacob Serpa, Product Marketing Manager, Bitglass; Brandon Dunlap (Moderator) Financial services firms face a unique set of challenges. Not only do they store large amounts of sensitive personal data, but they also face heavier ... 5 years ago | 60 mins Gewährleisten der Sicherheit in Office 365 und Azure [German] Alexander Bode, Solutions Engineer at Netwrix Cloud-Migration ist aktuell immer noch das bestimmende Thema für IT-Entscheider. Projekte sind oftmals in einer fortgeschrittenen Phase, allerdings gi... 1 year ago | 61 mins Risk Compliance & Control in the Age of Authorisation. Derick James, Director, Business Development, Ping Identity & Adam Rusbridge, Senior Product Manager, Ping Identity The number of digital properties, identities, and interaction points the typical enterprise must manage has exploded in recent years. As more and more... 1 year ago | 34 mins Data Loss Prevention: Track and Secure All Network Data to Prevent Breaches Sunil Ravi, Chief Security Architect at Versa Networks As companies scale, they often lack the ability to centrally monitor how their most sensitive data passes through their network ports. When companies ... 8 months ago | 62 mins A Practical Guide to Meeting Cybersecurity Requirements Adrian Davis, Managing Director (ISC)2 EMEA | Craig Isaacs, CEO Unified Compliance Cybersecurity is a mess. The number of guides, standards, laws, rules, and regulations grows every day, and most organisations don’t have the ability ... 7 years ago | 59 mins A Pragmatic Approach to Compliance with Policy-Based Encryption Ken Liao; Proofpoint, Encryption Specialist Email continues to be the number one source of data loss risks. If your organization handles data governed by regulations such as PCI, HIPAA or GLBA, ... 12 years ago | 47 mins Breaking Identities The Fastest Way to Compromise Chris Roberts | Chief Security Strategist at Attivo Networks Chris Roberts is considered one of the world’s foremost experts on counter threat intelligence. With increasingly sophisticated attacks on targets of ... 2 years ago | 26 mins Privacy and Data Protection Manju Lal, Cyber & Data Privacy Practice, PwC and Nathan Turajski, Security, Risk and Governance Solutions, Micro Focus With an increasing number of data breaches and mis-use of personal information incidence, organizations are increasingly challenged with protecting in... 3 years ago | 38 mins Compliance in 2019: What You Need to Know Mark Trinidad From the California Consumer Privacy Act (CCPA) to HIPAA to the GLBA, data privacy and protection has become one of the foremost issues for any organi... 3 years ago | 31 mins Load more