Hi, what do you want to do?
Curated Video
DPO Tasks
This section provides information on the main governance and technical tasks to be delivered by the DPO
Curated Video
Continual Improvement for GDPR
Continually improving your GDPR compliance program is a necessity for compliance, you will learn the main skills and techniques on how to regularly improve your GDPR program
Curated Video
GDPR Toolkit
In this section, I will share with you important toolkits to help you implement and monitor GDPR program in your ogranization
Curated Video
SOC 2 | Everything you need to know
Why is SOC 2 Compliance Important? Compliance with SOC 2 requirements indicates that an organization maintains a high level of information security. Strict compliance requirements (tested through on-site audits) can help ensure...
Curated Video
Introduction to IT and Cybersecurity: Privacy and GDPR
Part 16/16 of Introduction to IT and Cybersecurity series: The video is a discussion on the importance of privacy and how it is protected by laws and regulations, particularly the General Data Protection Regulation (GDPR) in the European...
Curated Video
iPhone Security Model
In this video, we will be discussing the iPhone Security Model. We will explore the various layers of security that Apple has implemented to protect your personal data and information. From the hardware level to the software level, we...
The Wall Street Journal
Navigating Communication and Legal Risks during a Cyber Crisis
Communications and legal experts discuss the guiding principles of accurately planning and executing a crisis response strategy, including major areas of risk and where a company's priorities should be.
Seven Dimensions
Understanding Confidentiality in Human Resources
This video discusses the importance of confidentiality in human resources and the challenges faced by HR professionals in maintaining it. It highlights the different types of information that should be kept confidential and the...
Blockchain Central
What's So Great about DApps?
This week on Blockchain Central: we will look at decentralized applications, their main characteristics and advantages, as well as show you a real-life example of DApp usage.
Blockchain Central
What's So Great about DApps? | Blockchain Central
This week on Blockchain Central: we will look at decentralized applications, their main characteristics and advantages, as well as show you a real-life example of DApp usage.
__
'Blockchain Central' is your #1 trusted source for...
Blockchain Central
Is Bitcoin an Anonymous Currency? | Blockchain Central
On today's episode of Blockchain Central we will shed some more light on the aspect of anonymity in the Bitcoin system. Can your transactions be tracked and what are the consequences? Let's find out!
Blockchain Central
Can GDPR Harm Blockchain?
This week on Blockchain Central: we will talk about new EU law regarding data protection. Can it be applied to blockchain systems and would it abolish anonymity that blockchain provide. Let's find out!
The Wall Street Journal
Which Regulations to Worry About
How can you gauge what laws and regulations apply to your type of business? What steps will take account of new state laws and to stay compliant with federal or international laws?
Blockchain Central
Can GDPR Harm Blockchain? | Blockchain Central
This week on Blockchain Central: we will talk about new EU law regarding data protection. Can it be applied to blockchain systems and would it abolish anonymity that blockchain provide. Let's find out!
__
'Blockchain Central' is your #1...
The Wall Street Journal
Helen Dixon and Lothar Determann On the New Privacy Mandate
Helen Dixon and Lothar Determann discuss the unprecedented pressure on corporations to protect data privacy.
The Wall Street Journal
Business and AI
The race to develop and deploy artificial intelligence continues apace in the U.S. and China. Venture capitalist Kai-Fu Lee discusses how AI will reshape the world over the next 20 years.
The Wall Street Journal
How to Plan Communications Around Cyber Incidents
Three cyber executives discuss how they plan communications around cyber incidents, and how they make critical decisions about what to communicate, when and to whom.
The Wall Street Journal
The Future of Connectivity
Sir Tim Berners-Lee and John Bruce, co-founders of Inrupt, discuss their mission to reshape the internet by developing ways for individuals to own their personal data at the Wall Street Journal's Future of Everything Festival.
Next Animation Studio
U.S. charges four Chinese military operatives in Equifax 2017 hack
A federal grand jury charged four Chinese military officers on Tuesday for the massive hack of the credit rating giant Equifax that occurred in 2017.
TLDR News
Police Raid over Hancock's Affair: Who Leaked the Photos? - TLDR News
Yesterday the Information Commissioners Office conducted two raids to try and find out who leaked the photos of Hancock's affair. These investigations aren't just about uncovering the scandal either, they're trying to uncover a potential...
Curated Video
CISSP® Certification Domain 1 Security and Risk Management Video Boot Camp for 2022 - General Data Protection Regulation (GDPR)
This video focuses on GDPR.
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1: Security and Risk...
r/>
This clip is from the chapter "Certified Information Systems Security Professional CISSP Domain 1 - Security and Risk Management" of the series "CISSP® Certification Domain 1: Security and Risk...
IDG TECHtalk
Complying with CCPA: Answers to common questions
Enforcement of the California Consumer Privacy Act begins this summer, but lawsuits are already being filed. To help you comply and avoid being sued, CSO contributor Maria Korolov joins IDG TECH(talk) host Juliet Beauchamp to discuss...
Blockchain Central
Can You Earn on 51% Attacks?
This week on Blockchain Central: we will talk about how 51% attacks work and who could do them. We will also explain the problem of double-spending and how it can be exploited in attacks.