Privacy Focus Group: Are cookie banners indeed compliant with the law?
This webinar delves into the subject of compliance of cookie banners with the prevailing EU regulations, more particularly the GDPR and e-Privacy directive.
This webinar delves into the subject of compliance of cookie banners with the prevailing EU regulations, more particularly the GDPR and e-Privacy directive.
Vulnerability disclosure policies and hacker-powered security cannot be ignored. This Cyber Talk helps you understand the key elements to implement a CVDP or a bug bounty, whether you work for a corporation, nonprofit, open source project, or public entity.
In this webinar Semetis demystifies Internet cookies and provides clarity about their working. Correctly managing your website's cookies is an incredibly important part of compliance.
In this webinar Marc Wouters explains the DSP supervision strategy of the FPS Economy as a market surveillance authority and the challenges that the NIS law brings in this context, from knowledge building to maturing insights.
In this webinar Professor Preneel presents the various types of apps and systems and explains that privacy has always been at the heart of the development of the DP-3T technology in which he and his team have been actively involved.
In this webinar Jeroen Vandeleur (NVISO) gives you an overview on the Cloud logging capabilities and how they can be centralized. You also get some additional insights on security automation for Incident Response.
Stephen Schmidt, AWS’ CISO, spoke about the democratisation of security and the 10 focus points for security functions in 2020 during his Leadership Session at Re:invent 2019. In this webinar, Esteban Hernandez - Security Specialist at AWS - provides practical advice on how these can be achieved to improve a customer’s overall security posture.
In his webinar Mathias Claes (AXA Belgium) shares his experience with the implementation and governance of security controls for applications and data in the Cloud.
In this webinar you learn when a service becomes a cloud computing service from a pan-European legal perspective and which effect the different confidentiality clauses have on your relationship with your Cloud Service Provider.
In the legally murky world surrounding privacy and hacking, Cathérine helps you navigate the unknown and complicated paths and gives you practical advice about the dos and don'ts if you get hacked.
In this webinar, Bart Asnot shares his experience on how to build, handle and prepare for Cloud-based security.
In this webinar Kristof Tuyteleers elaborates on all the efforts spent by DNS Belgium in the area of security governance & management and on technical measures taken which are relevant for NIS compliance.