{"id":708,"date":"2020-07-10T01:57:02","date_gmt":"2020-07-10T01:57:02","guid":{"rendered":"https:\/\/insight.thomsonreuters.com.au\/business\/resources\/resource\/webinar-cyber-risks-and-data-threats-for-virtual-workforces"},"modified":"2020-09-07T05:44:58","modified_gmt":"2020-09-07T05:44:58","slug":"webinar-cyber-risks-and-data-threats-for-virtual-workforces","status":"publish","type":"insight_resource","link":"https:\/\/insight.thomsonreuters.com.au\/business\/resources\/resource\/webinar-cyber-risks-and-data-threats-for-virtual-workforces","title":{"rendered":"Webinar: Cyber Risks and Data Threats for Virtual Workforces"},"content":{"rendered":"\n<h4 class=\"wp-block-heading\">The unprecedented move for entire workforces to work remotely has introduced unique risks to cyber and data protection. These were addressed in a recent Thomson Reuters webinar on <em>Cyber Security and Data Protection: COVID-19 Legal Risks.<\/em><\/h4>\n\n\n\n<p>The panel featured four subject matter experts, with Tyrilly Csillag, Head of In-House and Commercial &#8211; Practical Law, Thomson Reuters Asia and Emerging Markets as the webinar moderator. We\u2019ve pulled some highlights from the session into this article, but if you\u2019re looking for more, <a href=\"https:\/\/connect.aem.thomsonreuters.com\/Cyber-Security-Data-Protection-COVID-19?utm_source=legal-insight&amp;utm_medium=legal-insight&amp;utm_campaign=cyber-webinar\">join the 90-minute session on-demand<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Webinar preview<\/h2>\n\n\n\n<script src=\"https:\/\/fast.wistia.com\/embed\/medias\/vvs88czmbw.jsonp\" async><\/script><script src=\"https:\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script><div class=\"wistia_responsive_padding\" style=\"padding:56.25% 0 0 0;position:relative;\"><div class=\"wistia_responsive_wrapper\" style=\"height:100%;left:0;position:absolute;top:0;width:100%;\"><div class=\"wistia_embed wistia_async_vvs88czmbw videoFoam=true\" style=\"height:100%;position:relative;width:100%\"><div class=\"wistia_swatch\" style=\"height:100%;left:0;opacity:0;overflow:hidden;position:absolute;top:0;transition:opacity 200ms;width:100%;\"><img decoding=\"async\" src=\"https:\/\/fast.wistia.com\/embed\/medias\/vvs88czmbw\/swatch\" style=\"filter:blur(5px);height:100%;object-fit:contain;width:100%;\" alt=\"\" aria-hidden=\"true\" onload=\"this.parentNode.style.opacity=1;\" \/><\/div><\/div><\/div><\/div>\n\n\n\n<figure class=\"wp-block-pullquote\"><blockquote><p><a href=\"https:\/\/connect.aem.thomsonreuters.com\/Cyber-Security-Data-Protection-COVID-19?utm_source=legal-insight&amp;utm_medium=legal-insight&amp;utm_campaign=cyber-webinar\"><em>Click here<\/em><\/a><em> to watch the webinar on-demand, or continue reading for highlights from the 90-minute presentation.<\/em><\/p><cite>PRACTICAL LAW<\/cite><\/blockquote><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Cyber session highlights<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Wheels of collaboration<\/h3>\n\n\n\n<p>Peter Leonard is&nbsp;Principal, Data Synergies Pty Limited and Professor of Practice at the UNSW Business School.&nbsp;<\/p>\n\n\n\n<p>During the webinar, Peter said that what is seeing in the market is a departure from what he calls a \u2018hub and spokes\u2019 model. Such a model is where organisations have been reorganising how they work on an organisation&#8217;s specific basis.<\/p>\n\n\n\n<p>\u201cIn particular, enabling their \u2018infotech\u2019 security so that their employees can work remotely with each other and communicate and collaborate within the organisation,\u201d Peter added.<\/p>\n\n\n\n<p>\u201cNow we&#8217;re moving to a much more complex cross-organisational model, where organisations, and in particular, consultancy businesses, such as law firms, are working <em>with<\/em> other organisations, and therefore have to manage wheels of collaboration across organisations.\u201d<\/p>\n\n\n\n<p>Of course, as Peter said, it\u2019s far more complex than that. Namely, you have to manage different systems and data moving between organisations, all in a secure environment.<\/p>\n\n\n\n<p>During the \u2018new normal\u2019, Peter argued that although many organisations have been focusing on <a href=\"https:\/\/insight.thomsonreuters.com.au\/legal\/resources\/resource\/webinar-practical-solutions-to-covid-19-legal-challenges\">data privacy as an initial concern<\/a>, now they must be acutely aware of how they manage trade secrets and business confidentiality.<\/p>\n\n\n\n<p>Peter also noted the legal risks attached to remote working. With many employees still working from home, there\u2019s not only the risk of data breaches through external threats, but one where employees could inadvertently expose confidential information.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cCyber security in the post-COVID world is not only about stopping bad actors, it&#8217;s also about ensuring that employees know what they should do and shouldn&#8217;t do when handling data in remote workplaces\u201d<\/em><\/p><cite>&#8211; <em>Peter Leonard, Principal &#8211; Data Synergies Pty Limited and Professor of Practice &#8211; UNSW Business School<\/em><\/cite><\/blockquote>\n\n\n\n<p>Peter said that to manage these risks, firms and organisations must have a dialogue with their employees. One may ask, does this play out among organisations who do this right? To this, Peter said:<\/p>\n\n\n\n<p>\u201cIt&#8217;s about balance, balancing the individual interests of employees, and the interests of others, including their families and the organisations with whom they work. So it&#8217;s a delicate balance and good organisations, I think, have learned through COVID-19, how to renegotiate that balance and engage with employees in a more collaborative way.\u201d<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Contact tracing and the <a href=\"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/should-you-download-covidsafe-consider-these-privacy-concerns-first\">COVIDSafe<\/a> example<\/h3>\n\n\n\n<p>The public debate following the release of the Australian COVIDSafe app was described by Dr Katharine Kemp, Senior Lecturer &#8211; UNSW Law, on the webinar as \u201cintriguing\u201d.<\/p>\n\n\n\n<p>\u201cMany people saw downloading the app as a matter of public duty, an obligation people owed to each other as a community. And that&#8217;s the way the government promoted it: as a \u2018Team Australia\u2019 moment,\u201d said Katharine.<\/p>\n\n\n\n<p>\u201cWe saw a number of lawyers and representatives of technology businesses very publicly support the app and its protections and argue that others should also download it. They highlighted the health needs of the community, including people in vulnerable health situations.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201c&#8230;I think, though, that we should also be considering [in regards to the COVIDSafe app] whether we have a civic duty in a situation like this to consider people who are or will be particularly vulnerable, if privacy protections are not good enough, or if there is discrimination against those who don&#8217;t use the app, bearing in mind that there are very significant sections of our population who cannot use an app like this\u201d<\/em> <\/p><cite>&#8211; <em>Dr Katharine Kemp, Senior Lecturer &#8211; UNSW Law and Academic Lead &#8211; UNSW&nbsp; Grand Challenge on Trust<\/em><\/cite><\/blockquote>\n\n\n\n<p>Will there be more instances of contact tracing as countries edge slowly into a post-pandemic environment? As Katharine pointed out, similar technologies are being proposed regularly and already in use around the world.<\/p>\n\n\n\n<p>\u201cI think it&#8217;s a highly relevant illustration of surveillance technology being promoted in the interests of public health due to the pandemic. We&#8217;re seeing more and more proposals for surveillance of our daily activities on that basis, and we\u2019re quite likely to see some \u201cpurpose creep\u201d as more extensive data is collected,\u201d she added.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Data breach response plans<\/h3>\n\n\n\n<p>Tyrilly Csillag asked Jacques Jacobs, Partner, Norton Rose Fulbright, on how legal departments can update their data response plans to be fit for the pandemic.<\/p>\n\n\n\n<p>\u201cI think there are a number of ways that we need to have a look at our data breach plans to make them fit for the pandemic. The first thing is really to build in increased vigilance to ensure that cyber events are spotted,\u201d Jacques replied.<\/p>\n\n\n\n<p>Particularly in the early days of the pandemic, where normal routines were disrupted, it was an easy time to miss the signs of an attack. In one example, Jacques has seen a number of phishing attacks where threat actors have been extremely sophisticated in how they present emails. It is critical, in Jacques view, for organisations to increase processes around vigilance and implement further training for staff on these risks.<\/p>\n\n\n\n<p>The legal risks attached to data privacy are not always cyber related. For example, Jacques said:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cWe&#8217;ve seen incidents where people have taken files home or not destroyed confidential documents securely (or even put them in the rubbish area of their apartment building). The information somehow found its way into the wrong hands!\u201d<\/em> <\/p><cite>&#8211; <em>Jacques Jacobs, Partner, Norton Rose Fulbright<\/em><\/cite><\/blockquote>\n\n\n\n<p>Jacques offered a few pointers on developing a COVID-19-fit cyber response plan. You want to make sure your employees are contactable, should a breach be spotted. Additionally, it\u2019s very easy to create a secondary breach, through insecurely emailing information about the breach for example.<\/p>\n\n\n\n<p>\u201cIn terms of your service providers, such as your IT professionals or the other companies that you might need to assist you, what are&nbsp;their&nbsp;remote working capabilities? Are they able to still undertake the task for you with the same level of efficiency?\u201d said Jacques.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Cyber incidents add pressure for organisations<\/h3>\n\n\n\n<p>Governments are taking action to address the evolving landscape. Just last month, the Australian government pledged it would invest $1.35 billion dollars into the country\u2019s cyber capabilities. This marks the nation\u2019s largest ever cyber security investment.<\/p>\n\n\n\n<p>Chris McLaughlin is Director in the Cyber Solutions Group at Aon, the global insurance company. He has seen his clients experience heightened pressure and strain, when it comes to managing external security risks and when employees are working from home.<\/p>\n\n\n\n<p>\u201cWe\u2019ve seen a huge rise in cyber criminal activity against our clients. If you read some of the statistics, phishing attacks have increased some 500% since pre-COVID and are increasing in sophistication and persistence.\u201d<\/p>\n\n\n\n<p>From an insurance perspective, Chris reminded that during past crisis situations such as 9\/11 and the global financial crisis, insider threats have increased. Therefore, it is not surprising that the global health crisis has prompted many organisations to review their cyber insurance policies and data breach response schemes.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p><em>\u201cWe know that threat actors are actively targeting individuals at home. They target virtual private networks in order to try and get access to corporate systems, and some organisations have actually had their physical premises broken into\u201d<\/em><\/p><cite>&#8211; <em>Chris McLaughlin, Director &#8211; Cyber Solutions Group at Aon<\/em><\/cite><\/blockquote>\n\n\n\n<p>As Chris acknowledged, the reality of living in this heightened threat environment with active external threats and also increasing internal threats during lockdown continues.<\/p>\n\n\n\n<p>For further information on data protection and cyber security during the global health crisis, visit <a href=\"https:\/\/anzlaw.thomsonreuters.com\/Browse\/Home\/About\/Coronavirus\">Practical Law\u2019s complimentary COVID-19 resources<\/a>.<\/p>\n\n\n\n<p><strong>Can you trust legal technology while working remotely? One Practical Law Editor delves into this question for <em>Legal Insight<\/em> in a piece on <a href=\"https:\/\/insight.thomsonreuters.com.au\/legal\/posts\/lessons-from-lockdown-learning-to-trust-legal-technology\">lessons to be learned during lockdown<\/a>.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The unprecedented move for entire workforces to work remotely has introduced unique risks to cyber and data protection. These were addressed in a recent Thomson Reuters webinar.<\/p>\n","protected":false},"author":46,"featured_media":710,"template":"","categories":[810,811,812,786,788,813],"tags":[849,815,816,850,851,852],"resource_type":[637],"insight_job_role":[817,792,793,818,794,819,820,821,614,822,823,795,796],"insight_practice_area":[824,825,797],"class_list":["entry","author-practicallawwritingteam","has-excerpt","post-708","insight_resource","type-insight_resource","status-publish","has-post-thumbnail","category-data-privacy","category-data-security","category-innovation-and-technology","category-legal-commentary-and-opinion","category-research-and-know-how","category-trends-and-the-future-of-law","tag-corporate-compliance","tag-cyber-security","tag-data-privacy","tag-data-protection","tag-highq","tag-practical-law","resource_type-webinar","insight_job_role-academic","insight_job_role-barrister","insight_job_role-compliance-officer","insight_job_role-general-counsel","insight_job_role-hr-ir-professional","insight_job_role-in-house-lawyer","insight_job_role-knowledge-manager","insight_job_role-legal-operations-manager","insight_job_role-partner","insight_job_role-practice-manager","insight_job_role-principal","insight_job_role-senior-executive","insight_job_role-solicitor","insight_practice_area-commercial-law","insight_practice_area-company-law","insight_practice_area-criminal-law","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Webinar: Cyber Risks and Data Threats for Virtual Workforces - TR - Business Insight Australia<\/title>\n<meta name=\"description\" content=\"The unprecedented move for entire workforces to work remotely has introduced unique risks to cyber and data protection in the legal industry.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insight.thomsonreuters.com.au\/business\/resources\/resource\/webinar-cyber-risks-and-data-threats-for-virtual-workforces\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Webinar: Cyber Risks and Data Threats for Virtual Workforces - TR - Business Insight Australia\" \/>\n<meta property=\"og:description\" content=\"The unprecedented move for entire workforces to work remotely has introduced unique risks to cyber and data protection in the legal industry.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insight.thomsonreuters.com.au\/business\/resources\/resource\/webinar-cyber-risks-and-data-threats-for-virtual-workforces\" \/>\n<meta property=\"og:site_name\" content=\"TR - Business Insight Australia\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-07T05:44:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/insight.thomsonreuters.com.au\/business\/wp-content\/blogs.dir\/4\/files\/sites\/18\/2020\/07\/on24-covid19dataprivacy-e1594340520113.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1900\" \/>\n\t<meta property=\"og:image:height\" content=\"1154\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/business\/resources\/resource\/webinar-cyber-risks-and-data-threats-for-virtual-workforces\",\"url\":\"https:\/\/insight.thomsonreuters.com.au\/business\/resources\/resource\/webinar-cyber-risks-and-data-threats-for-virtual-workforces\",\"name\":\"Webinar: Cyber Risks and Data Threats for Virtual Workforces - TR - Business Insight Australia\",\"isPartOf\":{\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/business\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/business\/resources\/resource\/webinar-cyber-risks-and-data-threats-for-virtual-workforces#primaryimage\"},\"image\":{\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/business\/resources\/resource\/webinar-cyber-risks-and-data-threats-for-virtual-workforces#primaryimage\"},\"thumbnailUrl\":\"https:\/\/insight.thomsonreuters.com.au\/business\/wp-content\/blogs.dir\/4\/files\/sites\/18\/2020\/07\/on24-covid19dataprivacy-e1594340520113.jpg\",\"datePublished\":\"2020-07-10T01:57:02+00:00\",\"dateModified\":\"2020-09-07T05:44:58+00:00\",\"description\":\"The unprecedented move for entire workforces to work remotely has introduced unique risks to cyber and data protection in the legal industry.\",\"breadcrumb\":{\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/business\/resources\/resource\/webinar-cyber-risks-and-data-threats-for-virtual-workforces#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insight.thomsonreuters.com.au\/business\/resources\/resource\/webinar-cyber-risks-and-data-threats-for-virtual-workforces\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/business\/resources\/resource\/webinar-cyber-risks-and-data-threats-for-virtual-workforces#primaryimage\",\"url\":\"https:\/\/insight.thomsonreuters.com.au\/business\/wp-content\/blogs.dir\/4\/files\/sites\/18\/2020\/07\/on24-covid19dataprivacy-e1594340520113.jpg\",\"contentUrl\":\"https:\/\/insight.thomsonreuters.com.au\/business\/wp-content\/blogs.dir\/4\/files\/sites\/18\/2020\/07\/on24-covid19dataprivacy-e1594340520113.jpg\",\"width\":1900,\"height\":1154,\"caption\":\"Cyber Risks and Data Threats for Virtual Workforces\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/business\/resources\/resource\/webinar-cyber-risks-and-data-threats-for-virtual-workforces#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/insight.thomsonreuters.com.au\/business\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\/\/insight.thomsonreuters.com.au\/business\/resources\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Webinar: Cyber Risks and Data Threats for Virtual Workforces\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insight.thomsonreuters.com.au\/business\/#website\",\"url\":\"https:\/\/insight.thomsonreuters.com.au\/business\/\",\"name\":\"TR - Business Insight Australia\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insight.thomsonreuters.com.au\/business\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-AU\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Webinar: Cyber Risks and Data Threats for Virtual Workforces - TR - Business Insight Australia","description":"The unprecedented move for entire workforces to work remotely has introduced unique risks to cyber and data protection in the legal industry.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insight.thomsonreuters.com.au\/business\/resources\/resource\/webinar-cyber-risks-and-data-threats-for-virtual-workforces","og_locale":"en_US","og_type":"article","og_title":"Webinar: Cyber Risks and Data Threats for Virtual Workforces - TR - Business Insight Australia","og_description":"The unprecedented move for entire workforces to work remotely has introduced unique risks to cyber and data protection in the legal industry.","og_url":"https:\/\/insight.thomsonreuters.com.au\/business\/resources\/resource\/webinar-cyber-risks-and-data-threats-for-virtual-workforces","og_site_name":"TR - Business Insight Australia","article_modified_time":"2020-09-07T05:44:58+00:00","og_image":[{"width":1900,"height":1154,"url":"https:\/\/insight.thomsonreuters.com.au\/business\/wp-content\/blogs.dir\/4\/files\/sites\/18\/2020\/07\/on24-covid19dataprivacy-e1594340520113.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/insight.thomsonreuters.com.au\/business\/resources\/resource\/webinar-cyber-risks-and-data-threats-for-virtual-workforces","url":"https:\/\/insight.thomsonreuters.com.au\/business\/resources\/resource\/webinar-cyber-risks-and-data-threats-for-virtual-workforces","name":"Webinar: Cyber Risks and Data Threats for Virtual Workforces - TR - Business Insight Australia","isPartOf":{"@id":"https:\/\/insight.thomsonreuters.com.au\/business\/#website"},"primaryImageOfPage":{"@id":"https:\/\/insight.thomsonreuters.com.au\/business\/resources\/resource\/webinar-cyber-risks-and-data-threats-for-virtual-workforces#primaryimage"},"image":{"@id":"https:\/\/insight.thomsonreuters.com.au\/business\/resources\/resource\/webinar-cyber-risks-and-data-threats-for-virtual-workforces#primaryimage"},"thumbnailUrl":"https:\/\/insight.thomsonreuters.com.au\/business\/wp-content\/blogs.dir\/4\/files\/sites\/18\/2020\/07\/on24-covid19dataprivacy-e1594340520113.jpg","datePublished":"2020-07-10T01:57:02+00:00","dateModified":"2020-09-07T05:44:58+00:00","description":"The unprecedented move for entire workforces to work remotely has introduced unique risks to cyber and data protection in the legal industry.","breadcrumb":{"@id":"https:\/\/insight.thomsonreuters.com.au\/business\/resources\/resource\/webinar-cyber-risks-and-data-threats-for-virtual-workforces#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insight.thomsonreuters.com.au\/business\/resources\/resource\/webinar-cyber-risks-and-data-threats-for-virtual-workforces"]}]},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/insight.thomsonreuters.com.au\/business\/resources\/resource\/webinar-cyber-risks-and-data-threats-for-virtual-workforces#primaryimage","url":"https:\/\/insight.thomsonreuters.com.au\/business\/wp-content\/blogs.dir\/4\/files\/sites\/18\/2020\/07\/on24-covid19dataprivacy-e1594340520113.jpg","contentUrl":"https:\/\/insight.thomsonreuters.com.au\/business\/wp-content\/blogs.dir\/4\/files\/sites\/18\/2020\/07\/on24-covid19dataprivacy-e1594340520113.jpg","width":1900,"height":1154,"caption":"Cyber Risks and Data Threats for Virtual Workforces"},{"@type":"BreadcrumbList","@id":"https:\/\/insight.thomsonreuters.com.au\/business\/resources\/resource\/webinar-cyber-risks-and-data-threats-for-virtual-workforces#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/insight.thomsonreuters.com.au\/business\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/insight.thomsonreuters.com.au\/business\/resources"},{"@type":"ListItem","position":3,"name":"Webinar: Cyber Risks and Data Threats for Virtual Workforces"}]},{"@type":"WebSite","@id":"https:\/\/insight.thomsonreuters.com.au\/business\/#website","url":"https:\/\/insight.thomsonreuters.com.au\/business\/","name":"TR - Business Insight Australia","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insight.thomsonreuters.com.au\/business\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"}]}},"_links":{"self":[{"href":"https:\/\/insight.thomsonreuters.com.au\/business\/wp-json\/wp\/v2\/insight_resource\/708","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/insight.thomsonreuters.com.au\/business\/wp-json\/wp\/v2\/insight_resource"}],"about":[{"href":"https:\/\/insight.thomsonreuters.com.au\/business\/wp-json\/wp\/v2\/types\/insight_resource"}],"author":[{"embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/business\/wp-json\/wp\/v2\/users\/46"}],"version-history":[{"count":0,"href":"https:\/\/insight.thomsonreuters.com.au\/business\/wp-json\/wp\/v2\/insight_resource\/708\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/business\/wp-json\/wp\/v2\/media\/710"}],"wp:attachment":[{"href":"https:\/\/insight.thomsonreuters.com.au\/business\/wp-json\/wp\/v2\/media?parent=708"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/business\/wp-json\/wp\/v2\/categories?post=708"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/business\/wp-json\/wp\/v2\/tags?post=708"},{"taxonomy":"resource_type","embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/business\/wp-json\/wp\/v2\/resource_type?post=708"},{"taxonomy":"insight_job_role","embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/business\/wp-json\/wp\/v2\/insight_job_role?post=708"},{"taxonomy":"insight_practice_area","embeddable":true,"href":"https:\/\/insight.thomsonreuters.com.au\/business\/wp-json\/wp\/v2\/insight_practice_area?post=708"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}