Videos, eBooks and other useful resources to address the challenges faced by data protection, privacy and cybersecurity leaders.
Just like detectives look into the mind of a criminal to solve the case, you can look into the mind of a hacker to guard your company’s online data. Hackers adapts quickly to new environments and enjoys a challenge. What are insights to be gleaned from their endeavors.?
Nymity's 2018 Privacy Compliance Software Buyer's Guide helps a Privacy Office to navigate the different types of privacy compliance software and to best decide where to invest in order to mitigate risk, build accountability, and achieve ongoing compliance. Get the ultimate guide to buying privacy software.
The toughest part of being an information security leader is justifying for security spend. Companies that do not spend enough start to build up cybersecurity debt. And when a serious breach happens, they find themselves in a situation where they have to pay down that massive debt, including interest.
The EU General Data Protection Regulation is the first comprehensive overhaul of European Union data protection rules in 20 years. What is the impact on businesses in Asia? What is the territorial scope, and controller and processor obligations? This session will discuss these intricacies and more.
India does not have a specific legislation dedicated to data protection and privacy. Presently, the Information Technology Act and the Reasonable Security Practices and Procedures and Sensitive Personal Data or Information Rules provides to a limited extent data protection and privacy in India.
With the explosive growth of devices, we are introducing more vulnerabilities into the digital environment, and enterprises are facing increasing cyber risks. How can organizations engage the White Hat community to find security vulnerabilities as an additional layer of cyber defence?
Macau, as a hub of increasing importance for service providers and international brands, poses specific challenges in data privacy compliance, especially in the transfer to outside of Macau of personal data collected within. In this session, get an understanding of the complex set of requirements and exceptions.
With the increased requirements around data breach notifications, companies need an effective response plan to limit the impact of a data breach incident. This session will discuss practical insights in conducting a data breach investigation using a walkthrough of a data security incident.