Remove IT Remove Retail Remove Webinar
article thumbnail

Retailers Face Many Challenges, Data Security Doesn’t Have to be One of the Them

Thales Cloud Protection & Licensing

Retailers and shoppers are leveraging and enjoying many benefits data sharing brings: loyalty programs, personalized experiences, easier product location and ordering, online shopping, mobile access and the list goes on. Unfortunately, this results in retailers as a top target for cyberattacks. Business is booming and data is flowing.

Retail 89
article thumbnail

Webinar on the SAFETY Act, Security and Insurance

Hunton Privacy

From physical threats to cyber attacks targeting a wide range of critical infrastructure, companies in diverse sectors, such as the financial, retail, entertainment, energy, transportation, real estate, communications and other areas, face a challenging landscape of risks and potential liabilities. Register for the webinar now.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IBM and TechD partner to securely share data and power insights with gen AI

IBM Big Data Hub

You are also invited to join our monthly webinars, where you can gain deeper insights into our products and learn best practices for implementation and usage. Streamlined access to effective product descriptions maintained a competitive advantage in online retail.

article thumbnail

The GDPR: Everything you need to know about data controllers and data processors

IT Governance

For example, a marketing executive at a retailer hires a company to conduct a survey on shoppers’ browsing habits. The executive (and the retailer generally) is the data controller, and the company conducting the survey is the data processor. It’s also common for organisations to get their own employees to process information.

GDPR 98
article thumbnail

Ransomware: Now Is the Time to Address This Challenge

Thales Cloud Protection & Licensing

Although the news headlines are flooded with incidents affecting areas from critical infrastructure and healthcare to retail and education, we have a great opportunity to address this challenge. This optimism is not without any foundation. We are all aware of the threat and its impact. Technology has advanced.

article thumbnail

How Lush could have protected its till system

IT Governance

Our website offers a host of information and free resources , including our popular webinar Five steps to a successful ISO 27001 risk assessment , which will help you understand how to effectively apply the Standard in your organisation. The value of an effective ISMS. Control 6.1.2 Determined if this was within its risk assessment criteria.

IT 63
article thumbnail

The Scalability Imperative: Responsiveness to Manage Planned and Unplanned Spikes

Reltio

The issue is particularly prevalent in industries like retail and financial services, which can contend with massive spikes in usage based on seasonality and marketing initiatives. This post offers a look at the topic of scalability, outlining what the concept means and how it applies to customer data management, with some customer examples.

Retail 68