Hi [[ session.user.profile.firstName ]]

Live Video Panel - Data Protection Done Right

As the number of data privacy laws and regulations increases globally, organizations need to take a proactive approach to data privacy and security, rather than reactive.

Join this interactive panel of industry experts to learn more about:

- How to bake privacy and security into your processes
- Best Practices for achieving regulation compliance
- How to mitigate risk with data loss prevention technologies and solutions
- Are we closer to a Privacy-and-Security-by-Design reality
- How to protect your organization from insider threats
- Recommendations for Improving Data Management and ensuring Data Protection

Panellists
Richard Agnew - VP EMEA - Code42
Steve Wright, CEO and Partner, Privacy Culture Limited
Bill Mew, Founder and Owner, Mew Era Consulting

Moderated by Allan Boardman, CGEIT Certification Committee Member, ISACA


Data Protection, Data Breach, Regulations, Compliance, Proactive Security, Data Privacy Security Strategy, GDPR, Data Governance, IT Security, Breach Prevention, Risk Management
Live online Dec 2 2:00 pm UTC
or after on demand 45 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Allan Boardman, ISACA | Richard Agnew, Code42 | Steve Wright, Privacy Culture Ltd | Bill Mew, Mew Era Consulting
Presentation preview: Live Video Panel - Data Protection Done Right

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • [Earn CPE] A CCPA Vs GDPR Comparison Guide for CCPA Readiness Apr 30 2020 5:00 pm UTC 75 mins
    Panel Moderated by Colin Whittaker, Founder of Informed Risk Decisions
    The groundbreaking California Consumer Privacy Act has been nicknamed California's GDPR, referring to the European Union's comprehensive data protection law that took effect in May 2018, just one month before the CCPA was passed. The CCPA, which comes into effect in January 2020, creates sweeping new rights for Californians and onerous transparency and other obligations for businesses handling their information.

    Businesses that have undertaken GDPR compliance will have an advantage in addressing CCPA, but those efforts alone won't suffice. The two laws share some key components, yet present crucial differences. On this webinar we aim to assist organizations in understanding and comparing the relevant provisions of the GDPR and the CCPA, to clarify and what they mean for your privacy operations, and ensure compliance with both pieces of legislation. You’ll learn:

    - Differences in the scope of application,
    - The nature and extent of collection limitations,
    - The rules concerning accountability,
    - Key differences so you don’t miss important requirements or “over-comply” by giving consumers wider scope of information than required.
  • [Earn CPE] Implementing a NIST Framework for Agile GRC Apr 9 2020 5:00 pm UTC 75 mins
    Panel Moderated by Colin Whittaker, Founder of Informed Risk Decisions
    In an age where cybersecurity threats are an everyday fact of life, organizations are looking for solutions that enable them to predict, prepare and react to the shifting landscape of cyber threats, and implementation of agile cyber security strategies is becoming inevitable to achieve that goal.

    Agile cyber security methods allow for the simultaneous defense of multiple attack surfaces against this new wave of advanced cyber attacks targeting businesses and services. The NIST Cybersecurity Framework enables organizations — regardless of size, degree of cybersecurity risk, or cybersecurity sophistication — to apply the principles and best practices of risk management to improving security. Attend this CPE webinar to gain insights on:

    - Getting a clear picture of the current health of your organizations' defenses
    - Defining your security road map using NIST CSF as a framework
    - Conducting gap analysis and executing remediation actions
    - Mapping the NIST CSF with security controls and built-in reporting templates that align with the framework.
  • [Earn CPE] Matching Threat Intelligence & Third-Party Risk for Cyber Security Mar 12 2020 5:00 pm UTC 75 mins
    Panel Moderated by Colin Whittaker, Founder of Informed Risk Decisions
    As organizations evolve and become more connected, their reliance on third-party ecosystems continues to grow. While these business relationships undoubtedly add value, they also introduce significant new risk and compliance challenges. The third-party risk management process is complex and involves more stakeholders and data sources than many people may think including: cyber risk information, supply chain, financial, IT, compliance, legal, and privacy risk data. But even with loads of available data, it’s extremely difficult for risk teams to know how to prioritize risk and focus remediation and response efforts without the proper context or processes.

    As a result risk management teams are turning to governance, risk, and compliance (GRC) solutions to help centralize all of this information in order to gain a more holistic view of their third-party ecosystem. Cyber third-party risk data is a critical piece of the puzzle to a holistic third-party risk program within a GRC solution. Having access to a threat-centric view of cyber risk provides risk management teams with real-time insights that enable them to make faster, more confident decisions and effectively manage third-party risk.

    On this CPE accredited webinar our panel of experts will address how to bring threat intelligence into the third-party risk management process and discuss:

    - The importance of holistic risk management and sustainable ongoing monitoring,
    - How to incorporate external content sources and create a centralized data repository for a more holistic view of your vendors,
    - Ways to advance your third-party risk maturity with threat intelligence.
  • [Earn CPE] Automating GRC to Increase Business Value Feb 13 2020 6:00 pm UTC 75 mins
    Panel Moderated by Colin Whittaker, Founder of Informed Risk Decisions
    GRC is neither a project nor a technology, but a corporate objective for improving governance through more-effective compliance and a better understanding of the impact of risk on business performance. GRC can vary dramatically depending on the businesses vertical market, and even further complexity can be found from one business unit to another. This complexity drives the need for different, highly specialized tools, which raises a huge set of cost, integration, and management issues.

    To address this challenge, many businesses are opting for an automated GRC (eGRC) solution, which aims to resolve the challenges associated with scattered and disconnected operational security processes through the centralization of data, alignment of processes and workflows, and clear enterprise-level visibility with trend and analysis metrics and reporting. The benefits of Automating GRC are substantial when businesses have a mature GRC program in place. Attend this expert CPE webinar to gain insights on:'

    - Understanding the GRC Business Drivers.
    - Defining Your GRC Strategy.
    - Developing a GRC Roadmap that is aligned with the Mission, Value, and Strategic Agenda of Your Business.
    - Getting Leadership Support and Enabling Cross-Departmental Collaboration.
  • [Earn CPE] Cornerstones to Fortify Your Enterprise Cybersecurity Defense Jan 23 2020 6:00 pm UTC 75 mins
    Panelists: Dr. Anton Chuvakin, Google Cloud; with Sumedh Thakar, Qualys, and speakers from Illumio, and KnowBe4.
    The enterprise cybersecurity landscape is dramatically expanding in scale and complexity, and cyberattacks are growing in magnitude and impact as digital transformation increases on a global scale. From phishing scams, to ransomware attacks, to malicious breaches from state actors, the potential threat to your business is huge. According to the Ponemon Institute, the average per breach cost to a company in 2018 was estimated at $3.86 million, an increase of 6.4 percent over the previous year.

    Even though cybersecurity presents a challenge to the enterprise, you are not helpless against the bad actors who seek to cause real and costly damage to your business. A proactive, company-wide, integrated digital security strategy that addresses cybersecurity threats at all levels of your business will provide you with both the offensive and defensive capabilities you need to handle whatever comes your way. Earn 1 CPE credit by attending this educational and interactive panel webinar. Our experts will discuss why fortifying your cybersecurity strategy should be a critical priority and highlight some best practices that you can employ to stay ahead of evolving threats, including how to;

    - Understand the changing cyberattack landscape,
    - Create a company-wide cybersecurity task force,
    - Evaluate your security budget against your threat level,
    - Fortify your cybersecurity defense with systems hardening, adaptive authentication, and endpoint protection.
  • [Earn CPE] Critical Steps to Manage CCPA Compliance and Risk in 2020 Dec 17 2019 6:00 pm UTC 75 mins
    Panelists: K Royal, TrustArc; Ilia Sotnikov, Netwrix, Szuyin Leow, LogicGate; and Datawallet.
    The California Consumer Privacy Act of 2018 (CCPA) is arguably the most expansive privacy law in U.S. history and will become enforceable in just a matter of months. The CCPA introduces new privacy rights for consumers and will force companies that conduct business in the State of California to implement structural changes to their privacy programs.

    The new rights given to California consumers are similar to the rights provided in the European Union’s General Data Protection Regulation (GDPR). The CCPA also subjects non-compliant businesses to expensive fines, class-action lawsuits, and injunctions.

    On this webinar, we will examine the impact of the CCPA, answer your burning questions, uncover the CCPA’s nuances, and address its ambiguities and challenges. We will also include strategies for creating compliance programs in the midst of the unknowns, and a strategic action plan for businesses to become compliant.
  • Live Video Panel - Data Protection Done Right Dec 2 2019 2:00 pm UTC 45 mins
    Allan Boardman, ISACA | Richard Agnew, Code42 | Steve Wright, Privacy Culture Ltd | Bill Mew, Mew Era Consulting
    As the number of data privacy laws and regulations increases globally, organizations need to take a proactive approach to data privacy and security, rather than reactive.

    Join this interactive panel of industry experts to learn more about:

    - How to bake privacy and security into your processes
    - Best Practices for achieving regulation compliance
    - How to mitigate risk with data loss prevention technologies and solutions
    - Are we closer to a Privacy-and-Security-by-Design reality
    - How to protect your organization from insider threats
    - Recommendations for Improving Data Management and ensuring Data Protection

    Panellists
    Richard Agnew - VP EMEA - Code42
    Steve Wright, CEO and Partner, Privacy Culture Limited
    Bill Mew, Founder and Owner, Mew Era Consulting

    Moderated by Allan Boardman, CGEIT Certification Committee Member, ISACA


    Data Protection, Data Breach, Regulations, Compliance, Proactive Security, Data Privacy Security Strategy, GDPR, Data Governance, IT Security, Breach Prevention, Risk Management
  • Live Video Panel - Creating a Winning Security Strategy for 2020 Dec 2 2019 11:30 am UTC 45 mins
    Panel of industry experts
    Join security experts as they review the past 12 months and discuss security strategies, solutions and tools for success in 2020 and beyond.

    Discussion topics will include:

    - The key factors CISOs should consider for their cybersecurity strategy
    - The current and future threatscape
    - Platform Security for 2020
    - Technological solutions that make CISOs' lives easier
    - How organizations are coping with the shortage of qualified security workforce
    - How CISOs can better communicate their strategy to the board

    Panellists
    Richard Agnew - VP EMEA - Code42

    Moderator to be confirmed

    Security Strategy, CISO, Cyber Security, IT Security, Best Practices, Skills shortage, Network Security, Cyber Defence, Breach Prevention, Data Security, Email Security, Vulnerabilities, Cloud Security
    "
  • Ask the Expert - Interview with Richard Agnew - VP EMEA - Code42 Dec 2 2019 9:30 am UTC 30 mins
    Paige Bidgood & Richard Agnew, VP EMEA, Code42
    Join this interactive interview with Richard Agnew - VP EMEA - Code42

    Code42 is the leader in data loss protection. Native to the cloud, the Code42 Next-Gen Data Loss Protection solution rapidly detects insider threats, helps satisfy regulatory compliance requirements and speeds incident response – all without lengthy deployments, complex policy management or blocking user productivity. Because the solution collects and indexes every version of every file, it offers total visibility and recovery of data – wherever it lives and moves. Security, IT and compliance professionals can protect endpoint and cloud data from loss, leak and theft while maintaining an open and collaborative culture for employees.

    Richard brings a broad base of sales and management experience to Code42, gained through years leading regional teams within internationally recognised brands such as Veeam, NetApp, and Dell. Outside of work, Richard is an avid cyclist who competes in a number of local organised cycling events.
  • [PANEL] How to Simplify Cyber Risk Management? Nov 20 2019 5:00 pm UTC 60 mins
    Panelists TBA
    In today’s multi-cloud and hybrid environments, CISO's are struggling to secure assets, manage security policies across clouds, monitor and mitigate risks, while also supporting the business. How are CISOs solving the challenge of complexity?

    Join this panel of experts to learn how to simplify cyber risk management as well as maximize the value of your team and technology.
    - Risk scoring and security controls
    - How to identify risks for organizations and their third-party vendors
    - How to prevent, detect, and respond to, privacy and network security incidents
    - Best of vulnerability and risk management in a multi-vendor environment
    - Best practices and use cases across industries
  • Emerging PCI DSS v4 Data Security and Privacy for Hybrid Cloud Nov 20 2019 5:00 pm UTC 60 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    The upcoming PCI DSS version 4.0 will include many new or revised requirements and compensating controls will be removed It will include support for a range of evolving payment environments, technologies, and methodologies for achieving security. PCI DSS v4.0 further supports the use of different new technologies. The new validation option gives organizations the flexibility to take a customized approach to demonstrate how they are meeting the security intent of each PCI DSS requirement. This customized approach supports organizations using security approaches that may be different than traditional PCI DSS requirements.

    Through customized validation, entities can show how their specific implementation meets the intent and addresses the risk. Unlike compensating controls, customized validation will not require a business or technical justification for meeting the requirements using alternative methods, as the requirements will now be outcome-based.

    We will discuss how PCI DSS v4 may impact:

    - Implementation of the new “Customized Controls”
    - Cloud implementations
    - Compliance cost
    - Changes in liability
    - Relation to the 49 new US State Laws
    - PII and PI privacy
    - Measure data re-identifiability for pseudonymization.
    - Apply data protection to discovered sensitive data
  • Advanced PII/PI Data Discovery Nov 13 2019 9:00 pm UTC 60 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    Join this interactive webinar as we discuss using advanced PII/PI discovery to find & inventory all personal data at an enterprise scale.

    Learn about new machine learning & identity intelligence technology, including:
    - Identify all PII across structured, unstructured, cloud & Big Data.
    - Inventory PII by data subject & residency for GDPR.
    - Measure data re-identifiability for pseudonymization.
    - Uncover dark or uncatalogued data.
    - Fix data quality, visualize PII data relationships
    - Automatically apply data protection to discovered sensitive data.
  • Ask the Expert – Can Security be an Innovation Enabler? Recorded: Nov 4 2019 16 mins
    Sherelle Farrington, Cloud Security Solutions Architect, Fortinet
    Join this live interactive Q&A session with Sherelle Farrington, Cloud Security Solutions Architect, Fortinet, where we'll be tackling key topics such as:

    1. How can we change security from a blocker into a digital innovation enabler?

    2. Isn’t a diverse, disparate mix of platforms a security nightmare?

    3. Can security even keep up with these dynamic, agile environments?

    4. How do we shift towards a more proactive, risk-focused approach?

    5. What impact are these evolving technologies having on overall infrastructure design?
  • [Earn CPE] Key Steps to Mature Your Third-Party Risk Management Program Recorded: Oct 31 2019 78 mins
    Colin Whittaker with Todd Boehler, Process Unity; Jason Sabourin, OneTrust; Mark Deluca, Coupa; and Evan Tegethoff , BitSight
    High-Profile Data Breaches have placed a spotlight on the risk of cyber security breaches with vendors and subcontractors, expanding the need to have greater rigor in third party risk management and ongoing risk assessments. Maintaining an effective third-party risk management program doesn't happen overnight. It's a journey that involves continual learning, refinement and evolution.

    And as a program matures over time, it results in the management of vendors and other third parties with fewer risks, lower costs, better performance and stronger compliance. Since every company is at a different place in their journey towards better vendor management, it's important to identify steps that you can follow as you mature your program, and to consider your vendor risk ecosystem and the data and services that can have an enormous impact on risk reduction. On this CPE accredited webinar our panel of experts will address some key steps to mature your third-party risk management program, including how to:

    - Create a third-party risk-management maturity roadmap.
    - Connect with enterprise systems to create a centralized data repository and enable seamless vetting activities across processes
    - Incorporate external content sources for a more wholistic view of your vendors plus more sustainable ongoing monitoring
    - Strengthen and streamline your third-party risk management efforts.
  • Practical Risk Management for the Multi-Cloud Recorded: Oct 10 2019 62 mins
    Ulf Mattsson, Head of Innovation, TokenEx
    This session will take a practical approach to IT risk management and discuss multi cloud, Verizon Data Breach Investigations Report (DBIR) and how Enterprises are losing ground in the fight against persistent cyber-attacks. We simply cannot catch the bad guys until it is too late. This picture is not improving. Verizon reports concluded that less than 14% of breaches are detected by internal monitoring tools.

    We will review the JP Morgan Chase data breach were hackers were in the bank’s network for months undetected. Network configuration errors are inevitable, even at the largest banks as Capital One that recently had a data breach where a hacker gained access to 100 million credit card applications and accounts.

    Viewers will also learn about:
    - Macro trends in Cloud security and Micro trends in Cloud security
    - Risks from Quantum Computing and when we should move to alternate forms of encryption
    - Review “Kill Chains” from Lockhead Martin in relation to APT and DDoS Attacks
    - Risk Management methods from ISACA and other organizations

    Speaker: Ulf Mattsson, Head of Innovation, TokenEx

    ----------------------------------------
    Join BrightTALK's LinkedIn Group for IT Security Insights: http://bit.ly/2IsbauU
  • [Earn 1 CPE] CCPA 101: What is It, and How Will It Impact Your Organization? Recorded: Oct 3 2019 73 mins
    Speakers: Jannie Wentzel, Risk Management Professional; and Kerwyn Velasco, Product Manager - Riskonnect
    The California Consumer Privacy Act goes into effect January 1, 2020. If you are a for-profit company operating in the state of California, you need to have the right processes in place to support CCPA privacy requirements – or face stiff penalties. Are you ready?

    Attend this CPE accredited webinar to understand what is required by the CCPA, what you need to do now to prepare, how it relates to the rest of your compliance program, and what other privacy laws are on the horizon.

    You’ll learn:

    - What types of companies are affected by CCPA
    - How CCPA compares to GDPR
    - How technology can help you comply with privacy laws
  • Data Protection & Privacy in 2020 Recorded: Oct 1 2019 57 mins
    Dr. Christopher Pierson | Shahrokh Shahidzadeh | Michelle Drolet
    What's new in data privacy and security? Discover how the compliance landscape is changing in 2020 and what organizations are doing - or should be doing - to prepare.

    Join this panel of experts for an interactive Q&A session to learn more about what's coming up on the horizon in 2020 regarding data privacy and security, and the steps you can take today.

    Viewers will learn more about:
    - Data regulations and deadline dates to be aware of
    - Privacy in the cloud
    - How to build trust through privacy
    - Recommendations for 2020
    - The CCPA checklist

    Speakers:
    - Dr. Christopher Pierson, CEO & Founder, BLACKCLOAK
    - Shahrokh Shahidzadeh, CEO, Acceptto
    - Michelle Drolet, CEO, Towerwall

    This Q&A panel is part of National Cyber Security Awareness Month.
    #CyberAware #BeCyberSmart
  • Ask the Digital ID Expert - Identity Verification & Authentication Trends Recorded: Sep 24 2019 20 mins
    Robert Prigge, President, Jumio & Tony Fish, Founder, AMF Ventures
    With identity theft and account takeover on the rise, it’s increasingly difficult for businesses to trust that someone is who they claim to be online.

    Join this exclusive interactive 1-2-1 interview where Robert Prigge, President, Jumio will share the latest identity verification and authentication trends and how you can leverage the power of biometrics, AI and the latest technologies to quickly verify the digital identities of new customers and existing users. Some questions to be tackled;

    What types of cybersecurity threats are on the rise? Any surprising stats?

    Is account takeover becoming a real threat in the financial services space?

    How will eKYC evolve over the next few years?

    How to balance the trade-off between customer experience and fraud detection?

    Are the new breed of challenger banks a threat to high street banks? If so why?

    Register today and do not miss out on the opportunity to have your questions answered in this interactive question and answer session.

    The Fifth Money Laundering Directive (5AMLD) - Can AML and identity verification processes be streamlined to deliver a better user experience?

    This session will give you insights into the digital identity, authentication and verification landscape. You will also learn how you can increase the return on investment in your digital transformation by reducing online application abandonment rates and improving conversion rates.

    Robert Prigge, President, Jumio & Tony Fish, Founder, AMF Ventures
  • Livestream Discussion - Mitigating Business Risk in FinServ with Cybersecurity Recorded: Sep 24 2019 36 mins
    Cheri McGuire, Standard Chartered | Tony Fish, AMF Ventures | Robert Prigge, Jumio | Steven Holt, EY
    Cyber-attacks have cost the financial services industry more than any other sector, especially due to the extremely sensitive data and assets that they are gatekeeping.

    Join this panel to learn:
    -What is the current state of the cybersecurity in financial services?
    -Why is cybersecurity more of a business risk than a technology issue?
    -Best practices for detecting and preventing threats

    Robert Prigge, President, Jumio
    Tony Fish, Founder, AMF Ventures
    Steven Holt, Practice Lead - EMEIA FS Cybersecurity, EY
    Cheri McGuire, Group Chief Information Security Officer, Standard Chartered Bank
  • Ask the Expert: How to Automate Identity Verification in Financial Services Recorded: Sep 24 2019 24 mins
    Mohan Mahadevan, VP of Research, Onfido & Tony Fish, Founder, AMF Ventures
    The interplay of Humans and Machines in AI-based Automation

    Machine learning systems are now routinely performing complex tasks at unparalleled levels of performance across a wide range of applications. However, mission-critical applications such as those in financial services have a minimum tolerance for errors and error correction. Resultantly, the design of machine learning-based systems for such applications requires unprecedented levels of oversight and adaptability.

    An optimal system has the right level of interplay between humans and machines. Onfido employs a large number of machine learning models to deliver scalable, secure and frictionless identity verification for their clients, whilst giving clients accurate data they need to remain KYC compliant—so ensuring their models deliver real-world results is business-critical. In this interview we talk with Mohan Mahadevan, VP of Research at Onfido, to learn about how the constraints on these applications, the tradeoffs in an optimal system, and what the future looks like.

    Mohan Mahadevan, VP of Research, Onfido
    Tony Fish, Founder, AMF Ventures


    About Mohan

    Mohan is an expert in computer vision, machine learning, AI, data and model interpretability, previously leading research efforts at Amazon as Head of Computer Vision and Machine Learning for Robotic Applications. He has over 15 patents in areas spanning optical architectures, algorithms, system design, automation, robotics and packaging technologies. As Onfido’s VP of Research he leads Onfido’s team of specialist machine learning engineers and is focused on ensuring their systems work both in the lab and the real world.
Trends, developments, and technology
Increasing expectations for good data governance, effective risk management and complex demands for legislative and regulatory compliance are presenting a growing challenge for organizations of all sizes. Tune in to live and recorded presentations by respected luminaries in the fields of governance, risk and compliance for insights on how to implement successful GRC strategies and processes for your organization.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Live Video Panel - Data Protection Done Right
  • Live at: Dec 2 2019 2:00 pm
  • Presented by: Allan Boardman, ISACA | Richard Agnew, Code42 | Steve Wright, Privacy Culture Ltd | Bill Mew, Mew Era Consulting
  • From:
Your email has been sent.
or close