How Can Organizations Address their Privacy Compliance Obligations – Webinar
Osterman Research discusses our recent research on privacy in the United States with CyberRes Voltage. Webinar presented on June 21, 2022.
Osterman Research discusses our recent research on privacy in the United States with CyberRes Voltage. Webinar presented on June 21, 2022.
Osterman Research discusses the findings of the recent research on data privacy in the United States with Dean Gonsowski of Gimmal. Webinar hosted by Gimmal on May 24, 2022.
Blog post on zero trust data collaboration, examples of data collaboration, and the need for something much more than written agreements to ensure data is safeguarded.
Our interview with CyberNews on Osterman Research – covering cybersecurity, market research, cyberthreats, data protection, and responding to security threats.
Research into how organizations in the United States are preparing for and responding to a new wave of privacy regulations, including preparedness for meeting current privacy requirements. Sponsored by CyberRes Voltage, Duality Technologies, Gimmal, KnowBe4, and Mimecast.
Insights into the state of current compliance with the original California Consumer Privacy Act (CCPA) and how organizations are approaching compliance for the California Privacy Rights Act (CPRA). Sponsored by ActiveNav, KnowBe4, Micro Focus, PerimeterX, and Progress MOVEit.
Zero trust offers a modern approach for security to meet modern work designs and tackle the cybersecurity challenges facing organizations. This research explores how organizations are deploying and planning to deploy a zero trust architecture. Sponsored by Archive360, BIO-key International, Progress MOVEit, SonicWall, and Symmetry Systems.
Research on the challenge of sensitive data discovery and how organizations are prioritizing and assigning responsibility for it. Commissioned by ActiveNav.
Webinar on the archiving and data protection challenges of Microsoft Teams. Presented in conjunction with Theta Lake.
Protecting data to ensure appropriate usage and avoid unauthorized or inappropriate usage is a major task for decision-makers with responsibility for the integrity of corporate data assets. Sponsored by BlackFog, Micro Focus – Voltage, Progress Software, and VMware Carbon Black.