Unstructured data is a compliance risk. Examples of this type of data can include the content of email messages and spreadsheets through to business plans and intellectual property. In this session we ask: where does your critical data reside? Who has access to your sensitive, classified data? And what policies, processes and remedial actions do you have to protect your data? We cover best practice on the most effective strategies that today’s security leader’s use when it comes to protecting data.
June 1, 2021
Diversity and inclusion (D&I) has been on most business’ roadmaps for years, with the events of the past year and the ongoing pandemic only acting to reenforce and highlight the inequities that some people face on a daily basis. The challenges, both technical and personal, that we have all faced have stress-tested every part of our lives.Read More
May 24, 2021
Rapid shifts in the way we structure our IT infrastructrues have put a spotlight on third party risk management, which is a key theme of PrivSec Global next month. Emma Osborn explains why the issue is so important for privacy and security.Read More