Operationalize a Global Identity Data Governance Policy

Presented by

Martijn Loderus, VP, Solutions Engineering & Services, JAnrain

About this talk

Multinational brands must adhere to different data governance standards and regulations of the regions and countries they do business in. For brands that operate multiple websites, applications and other properties, having siloed data warehouses with disparate policies creates inefficiencies, poor user experiences and legal vulnerabilities. To tackle these challenges, leading brands are investing in a global data governance policy that centralizes customer identity data, universally manages personally identifiable information (PII) across applications, and creates a self-service workflow for data subjects to manage their communication preferences and data. Watch this webinar featuring Janrain VP of Solutions Engineering & Services, Martijn Loderus, who has supported leading brands in implementing global data governance policies with customer identity and access management (CIAM) at the core. He recently helped prepare clients for the Global Data Protection Regulation (GDPR) and will share case studies from those experiences What you’ll learn: The cross functional business impact of identity data governance in today’s landscape Best practices to retain seamless customer experiences while ensuring compliance How CIAM works in regards to policy management The short- and long-term benefits of a global identity data governance policy Who should attend? Business leaders from information security, IT, legal and marketing teams

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (48)
Subscribers (4959)
Our channel is aimed to give you the full picture. We will educate you on current topics of interest with the Editor of IT Security Guru hosting the webcasts, Dan Raywood. Guest speakers will join in on the debates with their own expert view and no intention of keeping it to themselves. Our aim is to give you all the information you need, for you to be able to come to your own conclusion. http://itsecurityguru.org/