article thumbnail

Webinar Recap: Mitigating Cyber Risks

SecureWorld News

What is the difference between a day at the beach and managing a cyber risk assessment plan? Risk is not what happens or occurs after that risk materializes. The speakers also delve into notable topics about what risk is, what it is not, and how to analyze potential risks. A Data-Driven World and Navigating It.

article thumbnail

News Alert: Traceable AI report exposes true scale of API-related data breaches, top challenges

The Last Watchdog

. — Traceable AI, the industry’s leading API security company, today released its comprehensive research report – the 2023 State of API Security: A Global Study on the Reality of API Risk. The webinar features Larry Ponemon of the esteemed Ponemon Institute, and Richard Bird, Chief Security Officer of Traceable. 27 at 12 p.m.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What have the ICO said about data breach?

Privacy and Cybersecurity Law

The ICO have been discussing data breach reporting under GDPR in a new webinar. Here are the key points: GDPR introduces mandatory breach reporting. This applies to accidental breaches and internal breaches – not just those that are deliberate or are about losing personal data externally.

article thumbnail

Data Breach Lessons from the Trenches

Threatpost

How companies can identify their own insecure data, remediate data breaches and proactively secure data against future attacks.

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

The culprit: lax practices of a third-party data and analytics contractor. Related: Atrium Health breach highlights third-party risks. Third-party cyber risks are likely to persist at the current scale for a while longer. There is impetus for change – beyond the fear of sustaining a major data breach.

article thumbnail

Spotlight Podcast: Managing the Digital Risk in your Digital Transformation

The Security Ledger

But do they really understand the risks lurking in their digital transformation strategies? In this Spotlight Podcast, sponsored by RSA,* we're joined by RSA Portfolio Strategist Steve Schlarman for a discussion of managing the risks in digital transformation. Re-Thinking Cyber Risk. We Talk about Why.

article thumbnail

IDENTITY MANAGEMENT DAY 2023: Advice from Cyber Pros

CyberSecurity Insiders

“In the current digital landscape, identity security has gained paramount importance due to the growing cyber risks posed by phishing and social engineering attacks utilizing AI. These attacks have become more complex and challenging to detect, leading to increased instances of data breaches, account takeovers, and impersonation attacks.