Overcoming Unstructured Data Security and Privacy Choke Points

HealthcareInfoSecurity

Why do so many data loss prevention projects either stall or de-scope? Why with significant industry expenditures in the space do we continue to experience record-breaking instances of data breaches and exfiltration? What are the latest methodologies and technologies security and privacy executives should consider to protect their sensitive data and comply with ever-increasing and pervasive privacy regulations such as GDPR and CCPA. Join Deborah Kish, former Gartner data security analyst, as she shares insights gleaned from hundreds of sessions with CISO, CIO, CDO, CPO and CCOs to offer an insider's playbook to implementing an unstructured data security and privacy program.
Watch Now

Spotlight

Those high profile data breaches led to a swift response from the Government with the penalties for serious or repeated privacy breaches increased from $2.22 million to a minimum of $50 million at the end of December. Since then, the Government has released the Privacy Act Review Report and the 2023-2030 Australian Cyber Security Strategy that signpost a significant shift for Australia’s cyber landscape. Critical infrastructure; personal information; cyber security; dealing with ransomware attacks – all are likely to be shaken up.

OTHER ON-DEMAND WEBINARS

Combat Supply Chain Enterprise and Ecosystem Cybersecurity Threats

As cyber attacks pose a growing, more serious threat to supply chain operations, our supply chains are not as secure as they should be. Supply chain leaders are not experts in cybersecurity, and they need to establish tight governance approaches with IT and security counterparts across the enterprise to protect supply chain IT, cyber-physical systems, and products. The threat vectors extend well beyond the enterprise, reaching into the third-party supply chain ecosystems. This complimentary webinar explores the cyber risks that supply chains face, and the steps supply chain leaders can take to manage those risks, including talent, collaboration and transparency approaches.
Watch Now

Web Application Security Essentials

We know it’s a challenge to stay on top of your web application security with new vulnerabilities being introduced all the time by untrained developers. So what can be done? The most efficient way to reduce the attack surface is to educate your entire team on recognizing potential web security issues to avoid introducing vulnerabilities in the first place.
Watch Now

The Era of Digital Transformation: Building A Privacy and Security Practice in the Ever-Changing Landscape

This has been the year of digital transformation and adapting to new risks we never expected. This increased use of new technologies, combined with more and diverse personal data being collected, stored, and used, has catapulted us into a new era of privacy risk considerations.
Watch Now

Sacred Cash Cow Tipping 2019

Black Hills Information Security

Yet again it is time for another edition of Sacred Cash Cow Tipping! Or, “Why do these endpoint security bypass techniques still work? Why?” The goal of this is to share just some of the ways Black Hills Information Security bypassed endpoint security in 2018. Unfortunately, these webcasts still seem to be needed because there is a prevalent attitude that it is somehow possible to get endpoint security with full synergy and it will be bulletproof and under a single pane of glass. All with cyber threat intelligence and A.I. sprinkled in with a bit of EDR magic to stop all attacks.
Watch Now

Spotlight

Those high profile data breaches led to a swift response from the Government with the penalties for serious or repeated privacy breaches increased from $2.22 million to a minimum of $50 million at the end of December. Since then, the Government has released the Privacy Act Review Report and the 2023-2030 Australian Cyber Security Strategy that signpost a significant shift for Australia’s cyber landscape. Critical infrastructure; personal information; cyber security; dealing with ransomware attacks – all are likely to be shaken up.

resources