Hi [[ session.user.profile.firstName ]]

How to Avoid a CCPA Data Subject Request Denial of Service Attack

Demonstrating Compliance Through DSR Fulfillment Automation with Identity Verification

Companies that are flooded with thousands of DSRs all at once are at greater risk for a denial of service (DoS) attack that can overwhelm CSR and IT staff. In this scenario, manual processes reach a breaking point, in which businesses can’t safely respond to requests within the required timelines (usually 30 to 45 days depending on the regulation). With CCPA right around the corner, there’s no time like the present to start thinking about your company’s plans to circumvent DoS attacks and streamline DSR processes, which, according to the new regulations, must now include identity verification prior to fulfilling each request.

Join a lively panel discussion with experts from Integris Software, TrustArc, and Evident, and get ready to pose your toughest DSR fulfillment questions live as they explain:

• Why you must address data subject rights as a big data problem
• How to automate identity verification of DSAR requests
• The critical components of DSR lifecycle management
• The importance of privacy- and security-by-design

Each registrant will receive a copy of the white paper, Solving DSAR’s Big Data Problem – Four Recommendations Plus the One Thing You Should Never Do

Can’t make the webinar? Don’t worry. Register now, and we’ll send you the recording.
Recorded Dec 5 2019 51 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Nathan Rowe (Evident) I Michael Lin (TrustArc) I Drew Schuil (Integris)
Presentation preview: How to Avoid a CCPA Data Subject Request Denial of Service Attack

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • How to Avoid a CCPA Data Subject Request Denial of Service Attack Recorded: Dec 5 2019 51 mins
    Nathan Rowe (Evident) I Michael Lin (TrustArc) I Drew Schuil (Integris)
    Demonstrating Compliance Through DSR Fulfillment Automation with Identity Verification

    Companies that are flooded with thousands of DSRs all at once are at greater risk for a denial of service (DoS) attack that can overwhelm CSR and IT staff. In this scenario, manual processes reach a breaking point, in which businesses can’t safely respond to requests within the required timelines (usually 30 to 45 days depending on the regulation). With CCPA right around the corner, there’s no time like the present to start thinking about your company’s plans to circumvent DoS attacks and streamline DSR processes, which, according to the new regulations, must now include identity verification prior to fulfilling each request.

    Join a lively panel discussion with experts from Integris Software, TrustArc, and Evident, and get ready to pose your toughest DSR fulfillment questions live as they explain:

    • Why you must address data subject rights as a big data problem
    • How to automate identity verification of DSAR requests
    • The critical components of DSR lifecycle management
    • The importance of privacy- and security-by-design

    Each registrant will receive a copy of the white paper, Solving DSAR’s Big Data Problem – Four Recommendations Plus the One Thing You Should Never Do

    Can’t make the webinar? Don’t worry. Register now, and we’ll send you the recording.
  • Identity is 20/20: This Year’s Trends vs. Next Year’s Predictions Recorded: Nov 14 2019 46 mins
    Nathan Rowe, Chief Product Officer & Co-Founder, Evident
    2019 brought about some of the most highly anticipated, newsworthy developments in cybersecurity—from rampant data breaches of all sizes and types to the countless bots that are still impacting social media and political discourse, among other identity-centric innovations. It was certainly a year of change for the identity management world, as policymakers debated the benefits of facial recognition technologies in the spring, and come fall, the world is getting to experience the negative effects of smart cities in real-time with the protests in Hong Kong. As we stand at the precipice of 2020, it’s hard to imagine how the identity and security landscape might change. In many ways, all of the prominent issues of 2019 will become even more prevalent and controversial.

    In this webinar, we’ll outline potential paths for a few different identity and cybersecurity trends, especially as privacy and data protection regulations like GDPR and CCPA continue to normalize, forcing businesses of all sizes, industries, and locations to demonstrate compliance with new and evolving data security obligations.. Additionally, more recent trends like deepfakes are sure to be influential on the upcoming U.S. 2020 election and on the growing number of data breaches, which means staying one step ahead of the cybercriminals will be paramount to successfully combating their efforts.

    Join us to learn about the five biggest identity security trends from 2019 that are most likely to mature in 2020, as we discuss how yesterday’s trends will impact tomorrow’s political, cultural, and digital landscape.
  • Identity Verification: A Reset for Password Resets Recorded: Jul 18 2019 48 mins
    Nathan Rowe, Chief Product Officer & Co-Founder, Evident
    Every use case differs in the way it defines and executes password resets, but ultimately it’s imperative for many platforms to verify users’ identities for each password reset request – from enterprise employees to government applications and even with e-commerce and other human-centric sites.

    Platforms that integrate a secure identity verification method into their password reset process will benefit from having a greater level of assurance that the person initiating the reset is in fact who they say they are, and furthermore, will ensure that the user isn’t a bot or a bad actor impersonating an active user.

    For industries like finance, insurance, and healthcare that deal with a lot of personally identifiable information (PII) and other highly sensitive data, leveraging more rigorous verification standards for password resets becomes especially critical.

    In this webinar, we’ll discuss a range of identity verification methods with various assurance levels so that organizations of all sizes and industries can better understand how to build a password reset program that meets their specific security needs.

    Key Takeaways
    - Level set on why identity verification is important for account security and password reset interactions and how it affects every type of organization.
    - In-depth review of the most effective identity verification methods for successful (and secure) password resets.
    - Explore how identity verification works with multi-factor authentication for password resets.
  • Know Your Data, Manage Your Risk I Hold Less Data and Mitigate Breach Liability Recorded: May 21 2019 37 mins
    Nathan Rowe, Chief Product Officer & Co-Founder, Evident
    More than 200,000 data breaches have been disclosed since GDPR went into effect, and industry pundits expect that roughly 36,000 more will be reported by the end of 2019.

    The threat of a breach will never truly go away, even after the GDPR “transition year” comes to a close––it won’t matter how much we spend on cybersecurity training and technologies, because cybercriminals will always be one step ahead in identifying vulnerabilities and finding new ways to steal personal data.

    Reporting a data breach within 72 hours and immediately notifying the affected data subjects is certainly the best way to demonstrate GDPR compliance, but it’s hard not to feel like data breach response efforts are an admission of defeat to the bots, hackers, and bad actors.

    So, how can businesses stay GDPR compliant and avoid the financial burden of a data breach without sacrificing growth for security? The answer is simple: Never hold personal data.

    Register for our webinar and learn how this is not only possible, but incredibly easy.

    Key Takeaways
    - Why cybersecurity costs continue to soar, but our data is no more secure
    - The true cost of a data breach and how it can be avoided by simply holding less data
    - How to keep up with growing digital demands while also protecting personal data
    - GDPR has encouraged breach transparency, but has yielded few security solutions that actually solve the systemic problem of data storage and transfer… until now.
  • Money Makes the Cyberattacks Go ‘Round: Stealing Data Easier than Stealing Money Recorded: Feb 19 2019 42 mins
    Nathan Rowe, Chief Product Officer & Co-Founder, Evident
    Cybercriminals can easily monetize stolen data, either by leveraging it themselves for fraudulent activity, or by selling it –– either way, they’re getting paid.

    Digitally innovative hackers who target non-profit, educational, government, and other industries with minimal cyber defense mechanisms often find it easier to steal financial or medical records than it is to steal actual money, which further contributes to the value of personal data.

    Companies are handling and collecting more and more personal data than ever before… just one small lapse or vulnerability, and a hacker can potentially gain access to volumes of sensitive personal data.

    In this webinar, we’ll discuss why it’s just as important to safeguard your employees’ and customers’ personal data as it is to protect your bank account.

    Key Takeaways
    - Why cybercriminals prioritize data hacking for financial gain
    - The increasing value of data translates directly to dollars saved/lost
    - Mitigating the liability of handling data can be your best security measure
  • Get Ready for 2019: Top Cybersecurity Trends Recorded: Dec 11 2018 45 mins
    Nathan Rowe, Chief Product Officer, Evident
    2018 was an important year for cybersecurity and privacy. The General Data Protection Regulation (GDPR) went into effect and the California Consumer Privacy Act (CaCPA) passed amid a flurry of high-profile cyber attacks.

    While some organizations have prioritized compliance with the aforementioned regulations to prevent further damage and secure their reputations, others have simply treated them as suggestions for best practice, and have not yet implemented comprehensive processes and infrastructure to thwart cyber attacks and data breaches.

    Such a broad discrepancy in how companies are tackling their cybersecurity and data protection efforts begs the question: What will happen next year?

    In this webinar, we’ll discuss cybersecurity trends for 2019, with a focus on best practice recommendations as well as preventative measures that organizations can implement to protect themselves, their employees, and their customers from risk.

    Trend Topics
    - Cyber attacks powered by Artificial Intelligence (AI)
    - Data security risks associated with high-velocity employment (gig/share economy)
    - GDPR, CaCPA, and other regulatory impacts on cybersecurity and compliance
    - End-to-end integrations for identity proofing and authentication
    - Security by Design and by Default
  • Not All Background Checks Are Created Equal Recorded: Nov 14 2018 43 mins
    Nathan Rowe, Chief Technology Officer & Co-Founder , Evident
    "Why Background Checks Should Be a Part of Your IT Security Program"

    The term “background check” is not particularly well-defined –– it can mean many different things to different companies, and can also vary from type to type (and from vendor to vendor), but ultimately, having the right background checks in place can help organizations avoid serious IT and cyber security issues.

    Those who have never purchased background checks can be understandably confused and overwhelmed by the broad range of options, when selecting the right check can be as simple as evaluating them based on a few key factors: cost, scope, diligence, and regulatory compliance.

    Determining the best checks for your specific business needs can be a challenging undertaking. Some companies require background checks that are more comprehensive, while others may opt for checks that are less detailed and less costly.

    In this webinar, we’ll discuss the most common background checks available today, how they support a comprehensive IT cyber security program, and their applications in several different use cases, ranging from small businesses to enterprise-level organizations.

    Key takeaways:
    - Complete summary of all primary background check types
    - How background checks support a comprehensive (and compliant) cyber security program
    - Examples of which background checks work for specific company and industry use cases
    - Learn how automating background checks can minimize friction and reduce liability
  • The Case for Identity Proofing: Reduce Friction, Minimize Risk, & Build Trust Recorded: Oct 17 2018 47 mins
    Nathan Rowe, Chief Product Officer & Co-Founder, Evident
    In today’s digital landscape, is it possible to know with absolute certainty that someone is who they say they are online?

    Physical documentation like social security cards, driver’s licenses, school IDs, and law enforcement credentials can easily be obtained by imposters, and identity proofing is key to avoiding risks associated with theft and impersonation.

    Businesses can and should leverage identity verification now more than ever to reduce friction in their onboarding processes, prevent fraudulent users from accessing sensitive data, and build trust in their brand.

    Companies no longer have to choose between growth and security––new technologies are helping organizations of all sizes operate with confidence, knowing their constituents have been accurately verified.

    In this webinar, we’ll outline the fundamentals and the importance of identity proofing, while providing practical tips for implementation across a variety of use cases.

    Key takeaways:
    How identity proofing works across multiple use cases
    Why identity proofing is a category, not a binary, one-size-fits-all solution
    How authentication differs from verification
    How to automate identity proofing with the latest tools and technologies
  • Simplifying Data Access & Management for GDPR Compliance Recorded: May 22 2018 45 mins
    Nathan Rowe, CPO & Co-Founder Evident
    D-Day is right around the corner. By now, most companies are nearly completed with putting the necessary steps in place to meet the requirements. However, it is suspected that many companies will end up spending significantly more money per year meeting these regulations. Also, it is most likely that most of these changes have added more complexity to their business operations.

    Yet, it doesn’t have to be this way. This webinar will highlight the 10 key considerations that need to be made for controlling how data is accessed, stored, kept up to date, transferred and deleted. It will then breakdown methods to optimize the processes and technology used to address these requirements in a way that will significantly lower the effort and cost of your company’s operations.

    Join us to discuss:
    - How to assess the level of exposure your company has to this regulation
    - Recognizing the 10 key new data management requirements that have been put in place
    - Identifying processes and tools that will significantly reduce the effort required to meet regulations
  • Can You Afford A Data Breach? Recorded: Apr 25 2018 43 mins
    Nathan Rowe, Chief Product Officer & Co-Founder, Evident
    3.7 million personal data records are stolen every day. That’s 44 every second.

    The number increases every year, while at the same time we are digitizing even more about ourselves. Despite intense attention and new regulations, cybersecurity simply isn’t improving at an acceptable rate. Businesses are unable to keep up with the barrage of attacks. Even companies with deep expertise in data, such as Equifax, Deloitte and Yahoo have suffered significant data breaches.

    When everyone including the experts are falling behind, you have to ask yourself: Isn’t something fundamentally wrong with the way we handle personal data? How is it that attackers can act with near impunity, while well meaning companies and regular users cannot keep anything secret?

    Join this webinar to learn more about:
    - Solutions to mitigate the increasing threats to digital identity theft
    - The economic factors that perpetuate the underground industry capitalizing on those threats
    - The challenges for companies dealing with personal data related issues
    - Best practices, real world examples and lessons learned as businesses look to increase their access to the answers they need, while reducing their risk and liability
  • What Hackers Know That You Don’t: Personal Data Edition Recorded: Mar 22 2018 40 mins
    Nathan Rowe, Chief Product Officer & Co-Founder, Evident
    The internet is a rapidly shifting landscape that continues to integrate with our daily life. Today, having an easily searchable online identity that is inseparable from your own is considered a boon both in and outside of the workplace, and is often considered essential to maintaining a modern social circle. Half of internet users recycle their passwords, a practice that’s been shown to present a significant security risk, especially when it comes to the possibility of a data breach. The volume of stolen data increased 40% from 2015 to 2016 alone. These numbers aren’t just because there’s more information out there, either.

    Hackers are getting smarter and there are significant incentives for cyber-criminals to engage in and traffic stolen records on a massive scale. Coordinated attacks that exploit fundamental flaws in current data storage practices are becoming more common. As the digital presence of a user increases through multiple online services, all vying for different pieces of personal information, so does the chance that the information they enter may be compromised. Even with relatively limited access, attackers can combine what they’ve obtained from now-infamous breaches with publicly available info to further compromise a user’s identity to various ends.

    In this webinar, we will share solutions to mitigate the increasing threats to digital identity theft, as well as outline some of the economic factors that perpetuate the underground industry capitalizing on those threats. This webinar will focus on:

    - Share insight into how and why hackers are motivated to steal information now more than ever
    - Discuss how businesses can build secure ecosystems that are founded on authenticity, but created to protect personal data with less friction and risk
    - Review ways that businesses should rethink their approach to handling personal data and defend against the threat of a data breach
  • Are You Ready for GDPR? The Top 10 Things to Know for GDPR Compliance Recorded: Feb 20 2018 49 mins
    Cameron D'Ambrosi, Director, OWI Client Services & David Thomas, CEO & Founder, Evident
    Just three months remain before companies that process the personal data of those within the EU must be in compliance with the General Data Protection Regulation (GDPR). Yet, there are often still outstanding questions around some of the key changes that will go into place and their impact on various parts of an organization. This webinar will highlight 10 key considerations that need to be made for controlling how data is accessed, stored, kept up to date, transferred and deleted. It will also breakdown four key steps to take to assure that you are on your way to meeting the necessary requirements.

    Join the GDPR Dream Team as they discuss:
    - What GDPR is and who it applies to
    - How to assess the level of exposure your company has to this regulation
    - Understanding the new rights of data owners and what you need to be prepared for
    - How to ensure you put the right processes and technology in place to stay compliant
  • More Data. Less Risk: How to Grow Secure Marketplaces Recorded: Feb 1 2018 49 mins
    Jeremy Gottschalk (Marketplace Risk Management), Jose Heftye (Marsh) & David Thomas (Evident)
    From travel to staffing to babysitting, businesses are creating marketplaces. These ecosystems can only thrive when users feel confident that the data they are providing will be protected and businesses can be confident that the individuals using the platform are who they say they are. As businesses face more regulatory requirements and reputational risks that come with the threat of a data breach, finding efficient ways to manage identity authenticity is even more critical. With information becoming increasingly digitized, how do companies create safe, authentic platforms for their users without increasing the friction that typically comes with that protection?

    Businesses need to change their playbook for managing online identity. This discussion will focus on how businesses can build secure ecosystems that are founded on authenticity but created to scale with less friction and risk, mitigating the need to hold and secure personal data.

    Key Takeaways:
    - Understand the key obstacles faced by companies in assuring that individuals are who they say they are
    - Get a playbook to revolutionize the way you handle data and identity management
  • Staying Ahead of the Hackers: how to avoid being the victim of a data breach Recorded: Nov 16 2017 52 mins
    Nathan Rowe, Chief Product Officer, Evident
    Proving who individuals are on the Internet is nearly impossible. Traditional verifications such as credit cards and even user reviews are no longer enough to affirm trust between people in the digital world. Background checks and motor vehicle records are just the tip of the iceberg for what is really needed to validate someone’s identity. As information becomes increasingly digitized, how do companies create safe, authentic platforms for their users without increasing the friction that typically comes with that protection?

    To validate identities, businesses need to hold personal data making them an easy target for hackers and security breaches. There are multiple channels already available online to monetize this data leading to grave security implications for consumers as well as businesses. And as businesses face more regulatory requirements and even reputational risks that come with the threat of a data breach, finding efficient ways to prioritize authenticity is even more critical.

    This webinar will focus on:

    - how businesses can build secure ecosystems that are founded on authenticity, but created to scale with less friction and risk
    - mitigating the need to hold and secure personal data, as well as protecting against hackers
  • How to Get More Personal Data Without the Risk Recorded: Oct 24 2017 43 mins
    Nathan Rowe, Chief Product Officer, Evident
    Personal data is essential for your business - to enable trust and safety, to enable personalization of services, to enable growth of your business and to enable verification of identities. While obtaining and managing personal data is necessary, it can be extremely complicated, time consuming and risky. Handling or holding sensitive data can lead to major security threats. Companies are investing more time and energy to effectively acquire, manage and protect the personal information of their users and workforce to the detriment of their own business focus. Additionally, the regulatory requirements and liability that accompany any interaction with personal data continue to increase, putting additional strain on businesses to stay updated and compliant.

    From a user perspective, as individuals are asked to provide their information more broadly, security concerns and a loss of control become more prevalent, putting once-standard interactions at risk. These put even more pressure on businesses to protect their communities’ information as well as their brand equity.

    This presentation will discuss what challenges are faced by companies dealing with personal data related issues. We will cover best practices, real world examples and lessons learned as businesses look to increase their access to the answers they need, while reducing their risk and liability.

    Key takeaways
    - Best practices for how to share and secure personal information
    - Pitfalls to avoid as you grow your organization and expand offerings
    - Hear real world examples on how businesses engage with their communities and personal data
  • The Power of Evident Recorded: Oct 10 2017 2 mins
    Evident
    Safely and securely share verified personal information. We simplify the complicated world of personal data and security by taking you out of the middle of it.
Get verified personal data without the risk
Evident simplifies the way businesses and individuals share verified personal data. With a simple API integration, Evident reduces the friction and liability associated with collecting personal data for businesses, while empowering individuals to manage when and where their data is shared.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to Avoid a CCPA Data Subject Request Denial of Service Attack
  • Live at: Dec 5 2019 7:00 pm
  • Presented by: Nathan Rowe (Evident) I Michael Lin (TrustArc) I Drew Schuil (Integris)
  • From:
Your email has been sent.
or close