As an IT professional, many of the problems you face are multifaceted, complex and don’t lend themselves to simple solutions. The information technology community features useful and free information technology resources. Join to browse thousands of videos and webinars on ITIL best practices, IT security strategy and more presented by leading CTOs, CIOs and other technology experts.
If you own vRealize, but have yet to use it for full-stack dashboarding, rapid root cause analysis or hybrid cloud performance tuning, you're missing out. Watch experts from Blue Medora walk you through: How to unify on-and off-premises operations data within vRealize; Ways to create custom dashboards that give you a 360 view of your entire environment; and tips for using dashboards to pinpoint root causes up to 60% faster
In this webinar VuoLearning will introduce how you can transform your learning content from Powerpoints into interactive eLearning products. Come and check out the opportunity. eLearning course generation has never been easier!
Speaker: Stephen Sutton
Stephen Sutton is an experienced Customer Trainer with a demonstrated history of working in the telecommunications industry. He is a strong human resources professional skilled in Service Delivery, 3G, Training Presentations, Requirements Analysis, and ITIL.
Digitalisaatio ja tietosuojavaatimuksiin (esim. GDPR) vastaaminen ei onnistu ilman hyvin toimivaa käyttäjä- ja pääsynhallintaa (Identity and Access Management, IAM). Se on kuitenkin laaja kokonaisuus, joka vieläpä liittyy organisaatioissa ”kaikkeen”. Siksi käyttäjä- ja pääsynhallinnan kehittäminen on tehtävä harkitusti ja vaatii kokonaisnäkemyksen kehitettävästä IAM-ratkaisusta.
Tässä webinaarissa opit
· mistä käyttäjä- ja pääsynhallinnassa on kysymys
· mitkä ovat käyttäjä- ja pääsynhallinnan hyödyt
· mistä komponenteista käyttäjä- ja pääsynhallintaratkaisu käytännössä koostuu
· miten käyttäjä- ja pääsynhallinnan kehittämisessä kannattaa edetä
Puhuja: Eetu Niemi
Eetu on arkkitehtuurin monitoimimies, joka on tehnyt erityisen paljon töitä käyttäjä- ja pääsynhallinnan sekä kokonaisarkkitehtuurin parissa. Käyttäjä- ja pääsynhallinnan ratkaisuja hän on suunnitellut ja toteuttanut useilla toimialoilla. Hänellä on kokemusta niin arkkitehtuurisuunnittelusta ja määrittelystä kuin myös teknisestä suunnittelusta ja tuotteiden konfiguroinnista. Eetu toimii arkkitehtuurin sekä käyttäjä- ja pääsynhallinnan konsulttina Coalassa.
Join us at our next Career Conversations session. We'll discuss topics such as: what made them decide on IT or Cyber Security, what were some of their work/life challenges, and what skills and education do they see as essential to success?
Whether you are an experienced professional or just contemplating a future in Cyber Security, WSC's Career Conversations allows you to have a conversation with women making a difference. Join us and share in Career Conversations with successful women in cyber security!
Guests: Mary Chaney, Attorney At Law, The Law Offices of Mary N. Chaney, P.L.L.C.
Threat Intelligence and Forensics Expert, Founder of Horton Technologies, LLC
Hosted by Jessica Gulick, VP of the Women's Society of Cyberjutsu
About the Speaker:
Mary N. Chaney, Esq., CISSP, has 20+ years of experience within the fields of Law, Information Security, Privacy and Risk Management. She graduated from Xavier University in Cincinnati, Ohio with her B.S.B.A in Information Systems and received her J.D. degree from Thurgood Marshall School of Law. She spent several years practicing law in Washington, DC focusing primarily on anti-trust and intellectual property rights infringement cases. She then transitioned to serve by becoming a Special Agent for the FBI where she investigated cybercrime as their Information Systems Security Officer.
Ms. Chaney obtained her Certified Information Systems Security Professional (CISSP) certification in 2008. She has held senior level information security roles with Comcast, Johnson & Johnson and GE Capital. As an adjunct professor with the University of Cincinnati, she assisted with the establishment of their Cybersecurity Certificate program.
Currently, Ms. Chaney practices cyber security law for her own firm, The Law Offices of Mary N. Chaney, P.L.L.C. where she specializes in helping the CIO, CISO and General Counsel understand each other to legally protect the enterprise from cyber security risk.
Join Rob Anderson, Director of Product Marketing at NetFoundry, as he reviews how hybrid device, site, and cloud networking will evolve to meet digital transformation needs.
Learn how to make your networks as agile as the applications they need to support in your data center.
About the presenter:
Rob is Director of Marketing at NetFoundry. NetFoundry believes in enabling edge innovation. NetFoundry frees individuals, apps, groups, and businesses from traditional network, telco, and hardware constraints, enabling applications and business policies to control underlying networks, with security, compliance, reliability, & performance.
Prior to NetFoundry, Rob's roles included Director of Global Marketing & Product Management at Modern Systems, along with various management and product development roles in the telecommunications industry. Rob graduated from Clemson University in 2003, holds a Project Management Professional (PMP) certification from the Project Management Institute, and a New Product Development Professional (NPDP) certification from the Product Development and Management Association.
The enterprise world is changing faster than ever. To compete, it is now necessary to do business at an almost unprecedented size and scale. Facebook, PayPal, Alibaba—these seemingly disparate companies have upended entire industries by harnessing a single phenomenon: the platform business model.
In order to achieve this scale, winning companies are establishing digital platforms with APIs that extend their organizational boundaries.
Attendees will learn from MIT Fellow and Boston University Professor Marshall Van Alstyne and ProgrammableWeb Editor-in-Chief David Berlind:
- Why enterprises need APIs and API strategy models
- The impact of API adoption and complementary investments on enterprise performance and revenue growth, based on new research
- About an “owner’s manual” for creating a platform marketplace, revealing the strategies behind some of today’s rising platforms
In the space of storing, managing and protecting data, different approaches for handling information are used. The advent of cloud has brought in compelling benefits, but the amount of data that organizations continue to store is growing exponentially, resulting in mostly unrelated solutions that have lead to the rise of Hybrid IT. On the Data Protection side, Businesses increasingly demand 100% uptime with no data loss, or what IDC refers to as the "new race to zero" – 0 RPO and 0 RTO. Such scenarios are still unrealistic for all but the most expensive and demanding applications that can afford fully redundant systems.
IT organizations are improving the performance of their storage stacks and gradually driving down their RPO and RTO. Unfortunately, in most cases, this requires a complex strategy of interrelated components, which are often vendor and platform-specific, leaving IT to manually manage multiple systems and increasing the overall complexity of their environments.
Join this session to learn about:
- The latest advances in converging your storage and backup stack and how this can radically change the way you manage data
- The current challenges of copy data management and how to address them
- A dive into a TCO study depicting the savings achieved through this architectural change
- Why snapshots are obsolete and you to achieve near-instant data recovery
- A look into additional use cases of copy data for DevOps team
The technology advances presented in this session were recently recognized by Frost & Sullivan with the award for Technology Innovation for Data Storage and Management.
Join us for a 360 view from our Industry Expert, Jacob Cherian, VP of Product Strategy at Reduxio and previously Dell Inventor of the Year, as well as a Fireside chat with a Keith Worthington, IT Manager at LineMaster of the technology being presented.
For many firms, the migration to public cloud is well underway. Understanding what motivates these migrators and the challenges they face along the way can help you in your own journey.
Join this webinar for a rare look into an emerging group and a glimpse into the future of public cloud. You'll hear about the results of a Forrester Consulting study, commissioned by Red Hat, that looks at these aspects of firms migrating to the cloud:
> Their motivations and challenges.
> The strategies they're adopting for migration.
> What cloud migration in practice looks like.
Denodo Platform offers one of the most sought after data fabric capabilities through data discovery, preparation, curation and integration across the broadest range of data sources. As data volume and variety grows exponentially, Denodo Platform 7.0 will offer in-memory massive parallel processing (MPP) capability for the most advanced query optimization in the market.
Attend this session to learn:
* How Denodo Platform 7.0’s native built-in integration with MPP systems will provide query acceleration and MPP caching
* How to successfully approach highly complex big data scenarios, leveraging inexpensive MPP solutions
* With the MPP capability in place, how data driven insights can be generated in real-time with Denodo Platform
* Challenges with traditional architectures
Denodo Platform MPP capabilities and applications
* Product demonstration
The EU General Data Protection Regulation (GDPR) deadline of May 2018 is fast approaching! In the midst of preparing for the new regulation, it is equally important to understand how to provide visibility into endpoint data generated by your knowledge workers, and how to protect it.
In this live webinar, Code42’s Josh Evans, product manager, and Abhik Mitra, product marketing manager, will discuss how Code42 addresses the endpoint gap and enables your GDPR strategy.
Today's enterprises are going through a period of consolidation and moving workloads to the public cloud. Data center providers are acquiring smaller regional data center assets, creating less choice and more dominant players. New technology is compounding the shift, changing everything inside the data center. And a zero tolerance for downtime among the user community means that delays and maintenance windows are no longer an option. Things are changing quickly. And the prevailing industry trends are increasing the pace of that change:
- The Internet of Things (IoT) is pushing compute to the edge with smart devices, creating challenges for latency and scalability.
- Software-defined Environments require a complete rethinking of the way data centers are built. If executed correctly, they have the potential to eliminate the bottleneck typically associated with hardware.
- Machine Learning presents new forms of data and pattern recognition, which has direct implications for data center security and resource allocation.
- Serverless computing, while closely tied to IoT and other application development trends, puts more pressure on the core infrastructure to be scalable and automated.
How will this affect today's data center? This session explores the bleeding edge and how data center practitioners can capitalize on its momentum rather than become subsumed by it. Attendees will gain a nuanced understanding of the new technology trends that are taking shape. And they'll leave with strategies to adapt to new pressures and demands.
Many big data projects run into the 80/20 rule. 80% of resources is spent getting data into their analytic tools and only 20% on analyzing the data. Syslog-ng functions as an universal log ingestion tool which can deliver data from a wide variety of sources to Hadoop, Elasticsearch, MongoDB, and Kafka as well as many others.
Dan O’Prey, Chair of Hyperledger Marketing Committee and CMO at Digital Asset
Tracy Kuhrt, Community Architect, Hyperledger
Hyperledger is an umbrella open source project started in December 2015 by the Linux Foundation to support the collaborative development of blockchain-based distributed ledgers across industries. A blockchain is a continuously growing list of records, called blocks, that are linked and secured using cryptography. Transactions between two parties are recorded efficiently and in a verifiable and permanent way.
In this webinar, Dan O’Prey and Tracy Kuhrt will present an update on the blockchain market, industry trends, and new Hyperledger projects. They will discuss the technical items delivered over the last 6 months and focus areas for Hyperledger in 2018.
Connecting all the pieces to make zero downtime continuous delivery happen at scale is a challenge. Join this webcast to see real teams bring all the components together to make high-velocity deployment to Kubernetes scale. Get a hands-on view of the critical steps that go into making container management a scalable process that not only allows teams to delivery faster but with more confidence in the final result.
Our discussion will explore the forcing functions of digital transformation on today’s traditional data center as it expands into cloud environments and the security challenges that result. A key to digital transformation success is having IT at the digital table. We’ll discuss technologies such as automation, API and IoT gateways, and the security services you’ll need to be successful.
The reality is that Consumer Identity and Access Management and the Internet of Things are fostering unprecedented change. The scale and types of devices and digital identities are increasing at a significant pace, driving huge security and performance concerns. These concerns have many companies asking:
• How are potential risks being monitored and secured?
• How are users and devices being managed?
• How are directory services being configured?
Learn to address these challenges, while shaping a more secure and cost-effective infrastructure.
Join CA Technologies gurus Clayton Donley, SVP, Software Engineering, Security and Rob Lindberg, Sr Principal Product Manager, CA Directory to explore alternatives and recommendations. You'll also be able to compare performance results of leading next-gen directory services, tested and compiled by an independent, third-party.
You have multiple physical data centers, all presenting hardware, software, networking and management challenges. You’re making several copies of your data, and the petabytes are adding up. You need to tune into this webinar. We’ll share the two fastest ways forward on consolidation.
The volume and frequency of cyber-attacks makes it impossible for security analysts to use manual threat analysis to keep up with a rapidly changing threat landscape.
Innovations in artificial intelligence (AI) now make it possible to automate mundane security operations, and provide security analysts with access to large data sets. The benefits are significant: analyst time is freed-up, and they have access to better information enabling smarter, faster decisions about how to continually improve the security posture of their organization.
Join this Q&A panel on how AI can help improve your organization's overall security.
- Chris Roberts, Chief Security Architect, Acalvio
- Chris Morales, Head of Security Analytics, Vectra
- Vikram Kapoor, Co-Founder and CTO, Lacework
- Willy Leichter, Vice President of Marketing, Virsec
Most security information and event management (SIEM) customers are struggling to achieve meaningful success a year or more after initial deployment. This is especially true with mid-market companies, where shrinking IT security budgets and shortage of skilled cyber security resources have forced them to reconsider investing in a SIEM, and seriously look at managed security services options.
Before CIOs/CISOs take a leap of faith into any kind of managed security service, they want to be able to measure ROI with an outsourced managed solution, as opposed to managing their own SIEM. In this webinar, hear from security experts on:
- What does it take to build and manage your own SIEM in-house?
- What security SIEM blind spots can you avoid with a managed security service?
- How do you determine ROI of a managed service as compared to a SIEM?
May 25th, 2018, the day that Europe’s General Data Protection Regulations (GDPR) comes into effect, is fast approaching. Many US companies are behind the curve in determining whether and how GDPR applies to them and figuring out what to do about it.
Paul-Johan Jean, a GDPR legal consultant at Sphaerist Advisory, works with US companies to cut through the ambiguity and paralysis and get ready. Tune in on 2/15 at 1 PM EST to learn from this GDPR expert on how to:
-Dispel myths around the new regulation
-Take a practical, manageable and cost-effective approach to dealing with GDPR
-Identify resources that can help you comply with various requirements, such as record keeping or data breach notification
In the era of digital business, IT managers are increasingly responsible for delivering results that drive the success of their business. To achieve this, it is imperative that IT organizations implement a modern storage infrastructure that enables them to increase agility and thereby gain a competitive advantage. In this webcast, experts from Enterprise Strategy Group and Dell EMC will describe the key attributes and benefits of a modern storage infrastructure.
The adoption of SaaS applications continues to grow at an exponential pace. You do not want to clamp down on these applications because they are valuable tools for many of your employees. However, because the data and usage of these SaaS applications is invisible to IT administrators, they do expose your organization to potentially disastrous security and data theft risks.
Join us for a live webinar where you will learn how your organization can enable safe usage of SaaS applications and:
•Gain visibility and granular, context-based control of SaaS applications.
•Protect corporate data from malicious and inadvertent exposure after it has left the traditional corporate perimeter.
•Protect against new insertion and distribution points for malware.
•Satisfy compliance requirements while still maintaining the benefits of SaaS based application services.
The challenges of SaaS applications are already here whether they are enabled by IT or end users themselves. Find out how to take back control and safely enable their use.
The global scientific community benefits from having a diverse range of perspectives. As such, Russia is working to make its research more visible. In the same way, science in Russia benefits from a diverse range of global collaborators. The willingness of Russian universities to expand these collaborations and foster the excellence of Russian research is supported by the Russian Ministry of Education and Science. Tomsk Polytechnic University (TPU) is among such universities.
The aim of this webinar to showcase how TPU uses Pure to make university’s research more globally visible and what the impact of the TPU Portal has been.
In this session, Dr. Falkovich will cover:
1)Why TPU research management counts on PURE as it’s research information management system
2)How has international visibility for TPU research improved since the TPU Pure Portal was launched in September 2015 The statistics of Portal visibility as well as case studies of collaborations started with the help of Pure.
This webinar will be helpful for the universities of Western Europe and the BRICS countries (Brazil, Russia, India, China and South Africa) that have the same challenges and a similar economic and historical background.
Découvrez comment protéger les ressources les plus précieuses de votre entreprise, vos données, avec les solutions de protection des données Dell EMC. Confortablement installé dans votre bureau ou à la maison, rejoignez vos collègues et experts pour participer à ce webinaire sur la protection des données et découvrir comment Dell EMC, Numéro 1 dans ce domaine, vous aide à protéger vos données contre les attaques de type Ransomware et construire votre dernière ligne de défense.
Selling your house in the financial crisis-stricken Greece is up to this day a great ordeal. When faced with such a challenge, I was baffled by the sparsity of conclusive data on land value at my birthplace city, Thessaloniki. Embarking on a personal mission and collecting and processing more than 10K online housing ads together with open data, I managed to render an insightful interactive visualization of the actual real estate values on borough and city block level that was published through the Greek media. Join me on this thought process journey to find out how to
o Gather vast online data with simple scripting
o Combine your data with open data into meaningful structures
o Create interactive data visualizations that have an actual impact @ infographeo.com
This will be an interactive session, so please feel free to bring your thoughts and questions to share during the session.
Are you Prepared, Blissfully Unaware or in Full Panic Mode?
It’s 2018 and May 25th, aka G-Day (GDPR day), is rapidly approaching. Hopefully your organization is well on its way to completing the necessary steps to bring itself into line with the new regulations. However we all know that the best laid plans always have a way of falling behind.
This session will focus on the data breach prevention aspect of GDPR and will identify the key areas where you should have the right technology in place. Remember, no network can be made 100% hacker proof but with the right preparations, processes and technology in place, you can be well equipped to deal with any intrusion and minimize or even eliminate the possibility of data breach related fine from your local Data Protection authorities.
Most of us want to have better meetings with senior executives. Meetings that feel like conversations, not pitches. Meetings that build deeper relationships. Meetings that uncover more ways in which they can help their customers. Behind closed doors, when I ask what's holding people back, many will tell me things like, "I don't feel comfortable," "I have nothing to offer to them,"" or "I'm not at their level." Selling to Senior level executives can be difficult, and getting a first meeting can be a real challenge. But, in our experience, the most difficult part is not getting the first meeting. It's getting the second one. Or the third one. This webinar explores the ways that you can get to that second and third meeting
Join (ISC)² EMEA and PhishMe for a look back at 2017’s threats and a look ahead. We’ll provide an overview of what PhishMe's Intelligence team uncovered, discuss trends in phishing-delivered malware, and analyse how various delivery vectors evolved.
Some of the trends we’ll discuss:
•The implications of last year’s major global cyber-events, such as WannaCry and NotPetya
•The emergence of new ransomware families
•The abuse of legitimate functions built into business-critical software platforms to deliver malware
•The favouring of modularity and plug-in accompaniments to lightweight botnet and stealer malwares
•New ways cyber-criminals are obtaining cryptocurrency
Cyber-crime won’t slow down. Take this opportunity to learn from the recent past as you deal with current threats and prepare for whatever’s next.
Next generation threats are already here: advanced and hard to detect, they can exploit supply chains and legitimate software and hide in your systems for months, causing immense damage. They demand a radically different approach to protection. Join us to discuss these emerging trends and the action security leaders can take to protect their organizations and customers.
David Emm, Principal Security Researcher, Global Research and Analysis Team, Kaspersky Lab will present the main threat predictions for 2018 and their potential business impact; while Alessio Aceti, Head of Enterprise Business at Kaspersky Lab will consider the critical success factors for cybersecurity teams in the rapidly evolving threat landscape.
An expert panel, including Thom Langford, CISO, Publicis Groupe; Gareth Wharton, cyber CEO, Hiscox Insurance; Mike Buck, Head of Delivery, BJSS; Adam Maskatiya, General Manager UK and Ireland, Kaspersky Lab; and Dan Raywood, Contributing Editor, Infosecurity Magazine will debate and answer audience questions on whether there is ever an acceptable level of risk for enterprises facing next generation cyberthreats.
Attendees will come away with an understanding of emerging threats facing their sector, which they can use to develop robust security strategies capable of withstanding such sophisticated attacks.
The advent of 5G mobile network technology is upon us, and implementation is quickly approaching.
For mobile network providers, vendors and enterprises, achieving a 5G version will require new technology innovations for scalability, efficiency and security. For consumers, it means a whole new wave of digital customer experience.
These next-generation networks will no doubt be in high demand for improving latency and bandwidth, but with more people connected than ever before, what are the potential security implications or concerns for both the enterprise and the consumer?
Join this expert panel moderated by Ahmed Banafa, Faculty member at SJSU & IoT Expert. He will be joined by expert panelists Lindsay Notwell, VP of 5G Strategy, Cradlepoint, Upkar Dhaliwal, System Architect, Future Wireless Technologies, and Mansoor Hanif, Director of Converged Networks and Innovation, BT.
"Every service provider today has investment heavily in physical networking equipment. All their customers are all connected over the legacy network in one way or another. In order to maximize the ROI, there must be a simple and quick way to orchestrate new services using new network functions virtualizations (NFV) technology on top of the old network.
This live demonstration will showcase how this can be done, using the service orchestration, automation and activation capabilities of PacketFront Software’s BECS platform integrated towards an open source platform consisting of OPNFV, OpenDaylight and OpenStack."
A smart, hybrid and elastic platform for integration of everything, from businesses and applications to Cloud and Things. Such a platform will be built on a Cloud-first , API-first and Microservices based architecture to ensure digital readiness.
In many ways, having your Data Protection Policy in place is not necessarily the last mile, but the first. In order to be fully GDPR-compliant, you need to understand where all of your information is, where your privacy data lives and how it’s being secured.
Join Tom Mighell, VP of Delivery Services at Contoural as he discusses the roadmap you need to follow to achieve full compliance before the May 25th deadline.
Topics will include:
• Strategies to execute your policy
• How to train everyone in your organization to be aware of privacy requirements
• Appointing a Data Protection Officer to manage your privacy program for your organization
• Steps your organization needs to take now to be ready
Data visualization requires data to be prepared before any meaningful analysis can be conducted. Finding insights, making correct observations and taking actions to drive outcomes therefore don't just depend on the way information is communicated but also on the preparation preceding the analysis.
In this webinar we discuss the key steps for data preparation to enable effective analysis and visual exploration of the data. We will show practical examples from projects we have worked on as well as share some simple data preparation ideas from our Makeover Monday challenges.
Lastly, we will show an example of how data preparation can enrich a dataset and enable further analysis.
APIs are powerful, and for many teams, very new. A strategy for APIs is complex because it needs to cover many areas. Many teams don't know how to articulate the benefits of APIs to craft a strategy. And defining and using an API strategy involves many roles and teams—not just techies anymore.
In this webcast, you’ll get a general introduction to ""the API economy"" and winning strategies in that economy. Topics will include:
- Business drivers for APIs and API management.
- API strategy models and methodology.
- Case studies from actual teams.
- Best practices of successful API teams.
- Practical checklists.
Many network operation teams struggle to address data friction issues by failing to leverage their network. Using a network as a real-time data source allows you to confidently maximize the value of IT data. Sign up to learn about an analytical approach to healthcare and how to leverage a network as a data source.
Gain practical insights from experts on the critical role of agility in digital transformation. In this session, we will discuss how conservative and low risk cultures can be quickly replacing agile methodologies and rapid experimentation.
But how? Join us hear from a seasoned panel of Digital Agility experts including Rob Koplowitz (Forrester Research - Principal Analyst), Gustavo Gomez (Bizagi - CEO), Rui Dinis (Director of Finance and Administration – Manpower) as we answer questions including:
•Where should change come from, top down or the ground up?
•What are the biggest barriers to building agile momentum
•What results have agile solutions delivered for Manpower Group?
Who should attend: Digital Technology leaders, Application Development Leaders, IT, Business and Process professionals
Everyone knows changes are risky; change management is responsible for managing that change-related risk. In theory, it’s simple; in the real world, it’s a far cry harder. This webinar presents a straightforward approach to identifying and analyzing change-related risk, along with practical risk mitigation strategies that you can put to use in your organization right now.
Attend this session to learn all about:
* Identifying change-related threats
* Assessing vulnerabilities
* Determining risk
* Risk reduction strategies
* Prioritizing risk mitigation efforts
A lot has been written recently about Agile expansion. That might sound scary when you are still new to Agile and might only have a few teams onboard. However, it is still important to start thinking about how you envision Scaling Agile and incorporating your business strategy.
Industry expert and ProjectManagement.com SME Andy Jordan believes that even for someone who is early in their agile adoption, it is essential to understand the concept of business agility.
Join Andy for this high energy, thought provoking webinar to learn:
-Why business agility matters and why you need to care about it
-The role of strategic agile models in supporting your agile success
-The importance of broadening Agile across multiple departments
In today’s business world every organization has to be able to react quickly and with minimal disruption to the inevitable changes they face. Business agility maximizes your ability to do that. Start improving things right now by signing up for this webinar.
Join this conversation between Primitive Logic’s technology solutions experts and Latham & Watkins’ Privacy and Data Protection legal expert to understand GDPR key points and technical solutions to help your GDPR readiness.
- What steps do you have to take to address the expanded definition of Personal Data?
- Consent Management Considerations
- What do the Privacy Rights given to data subjects mean for your digital data governance solutions?
Day 1 of 3 day series:
Day 1 – Overview of key concepts with legal and technical discussion of suggested actions
~ Day 2 – Focus on Privacy side of GDPR from a technology perspective
~ Day 3 – Focus on Security side of GDPR from a technology perspective
Jill P. Reber, Primitive Logic CEO
Kevin Moos, Primitive Logic President
Michael Rubin, Latham & Watkins Partner – Privacy and Data Protection