Hi [[ session.user.profile.firstName ]]

Evident

  • Date
  • Rating
  • Views
  • Simplifying Data Access & Management for GDPR Compliance
    Simplifying Data Access & Management for GDPR Compliance Nathan Rowe, CPO & Co-Founder Evident Recorded: May 22 2018 45 mins
    D-Day is right around the corner. By now, most companies are nearly completed with putting the necessary steps in place to meet the requirements. However, it is suspected that many companies will end up spending significantly more money per year meeting these regulations. Also, it is most likely that most of these changes have added more complexity to their business operations.

    Yet, it doesn’t have to be this way. This webinar will highlight the 10 key considerations that need to be made for controlling how data is accessed, stored, kept up to date, transferred and deleted. It will then breakdown methods to optimize the processes and technology used to address these requirements in a way that will significantly lower the effort and cost of your company’s operations.

    Join us to discuss:
    - How to assess the level of exposure your company has to this regulation
    - Recognizing the 10 key new data management requirements that have been put in place
    - Identifying processes and tools that will significantly reduce the effort required to meet regulations
  • Can You Afford A Data Breach?
    Can You Afford A Data Breach? Nathan Rowe, Chief Product Officer & Co-Founder, Evident Recorded: Apr 25 2018 43 mins
    3.7 million personal data records are stolen every day. That’s 44 every second.

    The number increases every year, while at the same time we are digitizing even more about ourselves. Despite intense attention and new regulations, cybersecurity simply isn’t improving at an acceptable rate. Businesses are unable to keep up with the barrage of attacks. Even companies with deep expertise in data, such as Equifax, Deloitte and Yahoo have suffered significant data breaches.

    When everyone including the experts are falling behind, you have to ask yourself: Isn’t something fundamentally wrong with the way we handle personal data? How is it that attackers can act with near impunity, while well meaning companies and regular users cannot keep anything secret?

    Join this webinar to learn more about:
    - Solutions to mitigate the increasing threats to digital identity theft
    - The economic factors that perpetuate the underground industry capitalizing on those threats
    - The challenges for companies dealing with personal data related issues
    - Best practices, real world examples and lessons learned as businesses look to increase their access to the answers they need, while reducing their risk and liability
  • What Hackers Know That You Don’t: Personal Data Edition
    What Hackers Know That You Don’t: Personal Data Edition Nathan Rowe, Chief Product Officer & Co-Founder, Evident Recorded: Mar 22 2018 40 mins
    The internet is a rapidly shifting landscape that continues to integrate with our daily life. Today, having an easily searchable online identity that is inseparable from your own is considered a boon both in and outside of the workplace, and is often considered essential to maintaining a modern social circle. Half of internet users recycle their passwords, a practice that’s been shown to present a significant security risk, especially when it comes to the possibility of a data breach. The volume of stolen data increased 40% from 2015 to 2016 alone. These numbers aren’t just because there’s more information out there, either.

    Hackers are getting smarter and there are significant incentives for cyber-criminals to engage in and traffic stolen records on a massive scale. Coordinated attacks that exploit fundamental flaws in current data storage practices are becoming more common. As the digital presence of a user increases through multiple online services, all vying for different pieces of personal information, so does the chance that the information they enter may be compromised. Even with relatively limited access, attackers can combine what they’ve obtained from now-infamous breaches with publicly available info to further compromise a user’s identity to various ends.

    In this webinar, we will share solutions to mitigate the increasing threats to digital identity theft, as well as outline some of the economic factors that perpetuate the underground industry capitalizing on those threats. This webinar will focus on:

    - Share insight into how and why hackers are motivated to steal information now more than ever
    - Discuss how businesses can build secure ecosystems that are founded on authenticity, but created to protect personal data with less friction and risk
    - Review ways that businesses should rethink their approach to handling personal data and defend against the threat of a data breach
  • Are You Ready for GDPR? The Top 10 Things to Know for GDPR Compliance
    Are You Ready for GDPR? The Top 10 Things to Know for GDPR Compliance Cameron D'Ambrosi, Director, OWI Client Services & David Thomas, CEO & Founder, Evident Recorded: Feb 20 2018 49 mins
    Just three months remain before companies that process the personal data of those within the EU must be in compliance with the General Data Protection Regulation (GDPR). Yet, there are often still outstanding questions around some of the key changes that will go into place and their impact on various parts of an organization. This webinar will highlight 10 key considerations that need to be made for controlling how data is accessed, stored, kept up to date, transferred and deleted. It will also breakdown four key steps to take to assure that you are on your way to meeting the necessary requirements.

    Join the GDPR Dream Team as they discuss:
    - What GDPR is and who it applies to
    - How to assess the level of exposure your company has to this regulation
    - Understanding the new rights of data owners and what you need to be prepared for
    - How to ensure you put the right processes and technology in place to stay compliant
  • More Data. Less Risk: How to Grow Secure Marketplaces
    More Data. Less Risk: How to Grow Secure Marketplaces Jeremy Gottschalk (Marketplace Risk Management), Jose Heftye (Marsh) & David Thomas (Evident) Recorded: Feb 1 2018 49 mins
    From travel to staffing to babysitting, businesses are creating marketplaces. These ecosystems can only thrive when users feel confident that the data they are providing will be protected and businesses can be confident that the individuals using the platform are who they say they are. As businesses face more regulatory requirements and reputational risks that come with the threat of a data breach, finding efficient ways to manage identity authenticity is even more critical. With information becoming increasingly digitized, how do companies create safe, authentic platforms for their users without increasing the friction that typically comes with that protection?

    Businesses need to change their playbook for managing online identity. This discussion will focus on how businesses can build secure ecosystems that are founded on authenticity but created to scale with less friction and risk, mitigating the need to hold and secure personal data.

    Key Takeaways:
    - Understand the key obstacles faced by companies in assuring that individuals are who they say they are
    - Get a playbook to revolutionize the way you handle data and identity management
  • Staying Ahead of the Hackers: how to avoid being the victim of a data breach
    Staying Ahead of the Hackers: how to avoid being the victim of a data breach Nathan Rowe, Chief Product Officer, Evident Recorded: Nov 16 2017 52 mins
    Proving who individuals are on the Internet is nearly impossible. Traditional verifications such as credit cards and even user reviews are no longer enough to affirm trust between people in the digital world. Background checks and motor vehicle records are just the tip of the iceberg for what is really needed to validate someone’s identity. As information becomes increasingly digitized, how do companies create safe, authentic platforms for their users without increasing the friction that typically comes with that protection?

    To validate identities, businesses need to hold personal data making them an easy target for hackers and security breaches. There are multiple channels already available online to monetize this data leading to grave security implications for consumers as well as businesses. And as businesses face more regulatory requirements and even reputational risks that come with the threat of a data breach, finding efficient ways to prioritize authenticity is even more critical.

    This webinar will focus on:

    - how businesses can build secure ecosystems that are founded on authenticity, but created to scale with less friction and risk
    - mitigating the need to hold and secure personal data, as well as protecting against hackers
  • How to Get More Personal Data Without the Risk
    How to Get More Personal Data Without the Risk Nathan Rowe, Chief Product Officer, Evident Recorded: Oct 24 2017 43 mins
    Personal data is essential for your business - to enable trust and safety, to enable personalization of services, to enable growth of your business and to enable verification of identities. While obtaining and managing personal data is necessary, it can be extremely complicated, time consuming and risky. Handling or holding sensitive data can lead to major security threats. Companies are investing more time and energy to effectively acquire, manage and protect the personal information of their users and workforce to the detriment of their own business focus. Additionally, the regulatory requirements and liability that accompany any interaction with personal data continue to increase, putting additional strain on businesses to stay updated and compliant.

    From a user perspective, as individuals are asked to provide their information more broadly, security concerns and a loss of control become more prevalent, putting once-standard interactions at risk. These put even more pressure on businesses to protect their communities’ information as well as their brand equity.

    This presentation will discuss what challenges are faced by companies dealing with personal data related issues. We will cover best practices, real world examples and lessons learned as businesses look to increase their access to the answers they need, while reducing their risk and liability.

    Key takeaways
    - Best practices for how to share and secure personal information
    - Pitfalls to avoid as you grow your organization and expand offerings
    - Hear real world examples on how businesses engage with their communities and personal data
  • The Power of Evident
    The Power of Evident Evident Recorded: Oct 10 2017 2 mins
    Safely and securely share verified personal information. We simplify the complicated world of personal data and security by taking you out of the middle of it.

Embed in website or blog