Dr. JJ Pan Anna Gamvros Kerwyn Garcia Pankaj Singh
Taking a Proactive Approach to Data Privacy in APAC (7AM BST | Singapore 2PM ) Dr. JJ Pan, Anna Gamvros, Kerwyn Garcia & Pankaj Singh
Axciom, Norton Rose Fulbright Hong Kong & Tech Mahindra Watch now

Additional Content

Please view our additional content below, from whitepapers to eBooks to videos provided by our sponsors, partners and subject matter experts. 

eBook: Making the case for Privacy Investment by DPOrganizer

Securing budget is tough even in good times.

Investments in data privacy are often hard to justify for budget holders, who don’t fully understand the nuances of high-risk processing activities. In this guide, written by the team at DPOrganizer, you’ll learn how to speak the language of a budget holder and create a compelling case for investments in privacy.

Download the guide and you’ll get access to:

● A blueprint for tying privacy success factors to your company’s bottom line

● 26 specific arguments that’ll help convince your CFO

● 2 fictional investment cases that summarise everything your stakeholders want to know


eBook: Remote Work Security – Privacy and Cybersecurity Essentials by BlackFog

With the onset of Coronavirus, the issue of remote working has been pushed to the forefront for organizations globally.

No longer a question of if employees should be able to work from home in flexible conditions, but rather quickly becoming a mandatory practice. Fortune 1000 companies around the globe are entirely revamping their office spaces to accommodate the fact that employees are already mobile, with studies repeatedly showing that desks are vacant 50-60% of the time. Twitter has also just announced that it is now mandatory for all of its 4900 global employees to stay home, while the story at Google is similar as they advise all employees in North America, Europe, the Middle East and Africa to work from home due to the virus.

With a dramatic increase in remote workers, organizations need to be prepared for an entirely new set of problems and challenges.

Organizations need to adequately monitor data exfiltration, threats, and data flow wherever the user may be based, no matter what device they are using.


eBook: Ransomware - The moment of truth for data protection by Commvault

A ransomware attack is a classic ticking-clock scenario. It has already struck companies of all sizes across industries around the world. Yours could be next. Are you ready?

Learn how to protect against ransomware and mitigate risk A complete ransomware strategy includes both reducing the risk of a successful attack and lessening the impact of an attack that does succeed. There are five things you need to do.


Whitepaper: Greater ransomware protection with data isolation and air gap technologies by Commvault

Protecting your data and ensuring its availability is your top priority. Like a castle in medieval times, you must always defend it and have built-in defense mechanisms. It is under attack from external and internal sources, and you do not know when or where it will come from. Vigilance is required, and you want multiple levels of safeguards for greater data protection. The same is true for your organization; a single event can threaten the bottom line or define a career. So how do you prepare? By making sure you’re recovery ready.


Whitepaper: Does Office 365 deliver the email security and resilience enterprises need? by Mimecast

With 60% of corporate knowledge workers reporting that email remains their most commonly used mode of communication, email continues to be the backbone of enterprise communications and could be considered the most critical infrastructure for daily operations.1 Cloud-delivered email services are rapidly becoming the preferred implementation approach by IT organisations.

With over 155 million users already running on Office 365,2 organisations are realising significant benefits over on-prem solutions, including reduced management costs, regulatory compliance, and the accounting shift from CapEx to OpEx.


eBook: The GDPR Maturity Framework by Privacy Culture

In May 2018, the General Data Protection Regulation (GDPR) became one of the most comprehensive data protection laws to be implemented in the world. Nearly all businesses and organisations handling the personal data of individuals living within the European Union, had to ensure they were compliant under the new regulations.

The regulations led to the development of the role Data Protection Officer (DPO), which in turn put them into the limelight answering difficult questions like “how and when we will be compliant with GDPR?”.

This white paper provides an overview of the GDPR Maturity Framework that helps a DPO. The GDPR Maturity Framework is based on 25 years of practical experience in designing and implementing cyber security and privacy control frameworks. The GDPR Maturity Framework is a result of a collaboration between privacy and security professionals, DPOs, lawyers & CISOs, and provides a realistic approach on how to make sure enough is done to remain compliant with GDPR.


eBook: Working from Home – Data Protection and Privacy Challenges by PrivSec

For many people, home is different. It’s a personal place. It’s a retreat from work, a safe refuge. We often behave differently there. Many of us are currently working from home, and that doesn’t just mean we bring our work home, it means bringing our office mindset home too.

In a way, it’s like we have two personas: the work persona where we behave one way, and the family persona. When they mix, things don’t always go smoothly.

With the current situation around COVID-19 forcing many organisations to adapt to working from home, there are many things to consider, not least is the implications of working from home on data protection and privacy processes.


eBook: Ransomware: Remediation Best Practices & Success Story by Rubrik

To pay or not to pay? That is the question confronting the growing number of businesses hit by ransomware. According to the FBI, ransomware will be a $1 billion market in 20201. If a strong ransomware remediation plan is not in place prior to an attack, paying a ransom can seem like the only option. And why do organizations pay? Recovery can be painful and time-consuming, and in many cases, the backups themselves can be compromised.

Organizations should not be forced to trade off paying a ransom and costly downtime. Instead, they should be able to rely on their backups to recover quickly and reliably. This requires developing and testing a strong remediation strategy before ransomware strikes.

This guide will help you develop your ransomware remediation plan, so when an attack occurs, you can resume business operations quickly without paying a ransom.