Hi [[ session.user.profile.firstName ]]

Threading the Needle: Building an End to End Approach to Data Rights Fulfillment

Managing and fulfilling the new class of data rights afforded by landmark regulations like the EU’s GDPR and the California Consumer Privacy Act have long been identified as key operational challenges for privacy. However, as many organizations look to transition from manual efforts for compliance, they have encountered increasing levels of complexity for how these rights are addressed in practice. These include the underlying technical challenge of responding to requests with accurate and comprehensive data accounting, to maintaining multiple types of reports based on regulation and business policies, as well as managing the intake of requests and response workflows for a positive user experience.


Join BigID’s VP of Privacy & Policy, Heather Federman and Director of Product Management, Tomer Elias for a dive deep into practical steps on streamlining and scaling the elements in the data request lifecycle to align with compliance and business objectives through an automated and flexible approach.


After attending this web conference you will:

-Understand the organizational impact of data subject’s rights fulfillment requirements and how data rights compliance can be aligned with business outcomes, like customer trust.
-Gain awareness of potential solutions to roadblocks that can stand in the way of operationalizing DSAR management and streamline processes.
-See how constructing and integrating an end to end approach to data rights can better enable privacy practitioners to respond to the current and future regulatory landscape.
-Learn how to align advanced data rights request management with broader enterprise and data governance objectives for privacy protection.
Recorded Jun 2 2020 56 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Tomer Elias, Director, Product Management, BigID. Heather Federman, VP of Privacy and Policy, BigID
Presentation preview: Threading the Needle: Building an End to End Approach to Data Rights Fulfillment

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Building A Sustainable Data Minimization Strategy Jul 28 2020 3:00 pm UTC 60 mins
    Anju Jain from BigID along with Brijesh Prabhakar and Ritu Khanna from LTI
    With data becoming the new currency, the natural tendency has been to accumulate vast amounts of consumer data by one and all. This proliferation has made it possible to multiply the use cases of data and bring speed to converting from hypothesis to predictions and forecasting. Excitement for the prospect of being able to grow and create new demand purely based on data, has fueled even further hunger for data.

    And the world slipped smoothly into a circle of more data, more possibilities, more data, more possibilities….

    But the other side of this data strategy is fraught with risks of poor accuracy, compromises in integrity and breach of sensitive consumer information. And, privacy regulations like the EU GDPR and others across the globe emphasize that enterprises collect only what they need under the principle of data minimization. Do you know the degree to which consumer data held in your organization is stale, incorrect and unused? Are you holding multiple duplicates of the same files and data? This can lead to increase in threat surface area, poor data process output, longer and inadequate response to privacy requests, not to mention storage costs for data that should not be in the system in the first place!

    Addressing privacy regulations can now also serve as a response strategy to these risks.

    In this interactive session, we will discuss
     the different contexts in which data minimization can be applied,
     realignment of business processes to embed minimization as a design principle, and
     best practices on data minimization techniques
     business case studies on benefits of data minimization realized across industry

    *BigID has partnered with LTI to bring you this webinar. Your registration information will be shared with LTI. Please go to LTI’s Privacy Policy for more details
  • How to Maximize Your Investment in Data: Strategies and Best Practices Jul 21 2020 3:00 pm UTC 60 mins
    Peggy Tsai, VP of Data Solutions, BigID. Sameer Ansari, Managing Director, Cyber Risk Service Group, Deloitte
    How data can drive decision-making? How should it? Organizations need to be able to balance their risk tolerance while managing defensive regulatory operations with proactive data initiatives.

    Join this interactive discussion with Sameer Ansari, Managing Director of Cyber Risk from Deloitte and Peggy Tsai, VP of Data Solutions at BigID to learn actionable data enablement strategies that will help maximize your investments in your data program.

    We’ll explore how to build a data culture to enable data ownership, policy-based remediation, and transparency for insights and analysis. You will learn:

    -Common data challenges (and how to address them): from breaking down data silos to how to gain traction for new programs
    -Data enablement tips to build a successful data culture
    -Best practices on data enablement capabilities for your data owners and consumers
    -Business use cases where data-focused initiatives have driven revenue or lowered cost

    *BigID has partnered with Deloitte to bring you this webinar. Your registration information will be shared with Deloitte separately. Please go to Deloitte’s Privacy Policy for more details
  • Scale Privacy Protection and Governance For Data Platforms Jul 14 2020 4:00 pm UTC 60 mins
    Will Murphy, VP of Technology Alliances, BigID; Atalia Horenshtien, Director of Sales Engineering & Alliances, SecuPi
    Privacy protection can’t be addressed by policies and workflows alone - especially as data teams embrace new technologies. As regulations increasingly mandate that enterprises meet a growing list of data rights - including deletion- and ensure that they restrict sensitive data access based on preferences and consent, integrated data knowledge and protection are needed to maximize value for data investments. To scale data privacy protection along with governance, enterprises need to automate the discovery of personal information across large volumes of data, understand that data in context, and orchestrate protection actions based on those insights.

    In this webinar, BigID and SecuPi will discuss how an integrated approach to data discovery and data-centric security can enable enterprises to embrace new data platforms while still addressing key compliance requirements at scale, such as data deletion requests, enforcing opt out preferences and removing identifying data from processing.

    In this webinar, attendees will learn:

    – How and why to map and inventory personal data privacy for data platforms at scale
    – How to leverage those insights to simplify fulfillment of data deletion requests and enable remediation
    – How to deliver governance for privacy-aware data pipelines and analytics programs
    – How an integrated approach to data privacy protection can deliver end to end auditing and reinforce security posture
  • Everything Has Changed: The Piece You're Missing Dealing With Enterprise Data Recorded: Jun 30 2020 58 mins
    Nimrod Vax, CPO of BigID, featuring Deepak Sood, CTO of Auritas
    One of the most important corporate assets is data. With the rise of the data economy, companies extract enormous value and competitive advantage by collecting, sharing, and utilizing data. Transparency about how your business requests consent, abides by privacy policies, and manages the data you’ve collected is becoming more and more vital to building trust with customers and partners who expect privacy.

    YOU’LL ALSO LEARN:
    -How data relationships across your SAP and non SAP systems impact your data privacy needs
    -How e-discovery tools can be utilized across enterprise data and linked document management platforms.
    -Tips on how to develop a framework for privacy & risk management by taking your compliance specifications to the next level
    -How to build a lifecycle, from creation to disposition, for data and documents.
    -How file clustering can help with file classification at scale
    -Making the metadata work for you across silos with quick integrations and application

    BONUS: How to use e-discovery to improve SAP master data quality.

    *BigID has partnered with Auritas to bring you this webinar. Your registration information will be shared with Auritas separately. Please go to Auritas' Privacy Policy for more details
  • Spokes 2020 Privacy Tech Conference: Technology and Privacy Protection Recorded: Jun 29 2020 61 mins
    Dimitri Sirota from BigID, Justin Antonipillai from Wirewheel, Dan Frank from Deloitte & Touche LLP, Zac Murphy from T-Mobile
    We all read about ways in which we can bring technology to our privacy world, but where are we seeing real progress? For example, when companies “automate” privacy programs, what does that mean? When companies say that they can “integrate” or bring “artificial intelligence” or “bots” to privacy, what are they doing? Are people really necessary for privacy protection? Privacy and Technology leaders Dan Frank (Deloitte), Zac Murphy (T-Mobile), and Justin Antonipillai (WireWheel) lead this discussion for our community.
  • Better Together: How Companies Can Break Down Silos for Working on Compliance Recorded: Jun 29 2020 49 mins
    Heather Federman at BigID, Robert Maranca at Schneider Electric, Giorgia Vulcano at The coca Cola Company
    The complexity and interdisciplinarity of the GDPR have led many businesses to create cross functional teams to address and meet the new compliance standards. Whilst the collaboration between lawyers, developers, HR and marketing professionals (among others) creates many benefits, the challenges of bringing together a group of experts with very different perspectives are not few. A panel of experts will share tips and lessons learnt on how they made this work.
  • Security & Privacy for Data Analytics Recorded: Jun 19 2020 51 mins
    Roger Hale, CSO at BigID
    In this BigID Digital Summit speaker session we're joined by Chris Hatter, CISO at Nielsen, Andy Roth, CPO at Intuit, Sounil Yu former Chief Security Scientist at Bank of America, and BigID's CSO, Roger Hale. Together these industry experts discuss how to build a proactive data security program for data analytics.

    Originally aired as part of the BigID Digital Summit: Is Data the New Perimeter?
  • Data Protection Through The Ages Recorded: Jun 19 2020 15 mins
    Patrick Heim, Partner & CISO at Clearsky and Roger Hale, CSO at BigID
    Learn about the evolution of data protection to where we are today, best practices for thinking security-first in today’s digital environment, and how companies should be thinking about data protection in the future.

    Originally aired as part of the BigID Digital Summit: Is Data the New Perimeter?
  • Fireside Chat: Building Data Trust In A Zero Trust Environment Recorded: Jun 19 2020 12 mins
    John Kindervag, Field CTO at Palo Alto Networks
    Tune in to hear John Kindervag, Field CTO of Palo Alto Networks and creator of Zero Trust, join BigID CISO Roger Hale to discuss the current challenges facing around building data trust in a Zero Trust environment.

    Originally aired as part of the BigID Digital Summit: Is Data the New Perimeter?
  • Protecting Data In The New Era of Privacy & Cloud Recorded: Jun 19 2020 48 mins
    Patrick Heim, Clearsky
    We're joined by Mario Duarte, CISO at Snowflake, Caleb Sima, VP of Security at Databricks, Philip Martin, CISO at Coinbase and Patrick Heim from Clearsky to discuss how CISOs should be thinking about protecting company data in the new era of privacy and the cloud.

    Originally aired as part of the BigID Digital Summit: Is Data the New Perimeter?
  • The Future of Privacy – How SAP Companies are Maturing their Privacy Programs Recorded: Jun 16 2020 59 mins
    Nimrod Vax, BigID / Aric Quinones & Chris Aramburu, Protiviti / Erin Hughes, SAP
    As privacy concerns continue to mount and expand, the world is evolving its view on how to address data privacy in the future. Organizations have two major shifts:

    1) Moving their focus from short-term regulation requirements to long-term privacy requirements
    2) Realigning their view on tactically focusing on short-term single considerations and transitioning
    to a long-term comprehensive platform architecture

    In this session, we will explain the challenges with evolving long-term needs, technology evolution, key considerations in developing your privacy and protection roadmap, and how AI & ML technologies such as Data Mapping and Protection by BigID are integral to an organization’s success.

    Key Takeaways:
    -Discuss the challenges with data privacy, security and governance
    -Develop a privacy and protection roadmap that supports future advancements and regulations such as CCPA and GDPR
    -Learn how SAP’s end-to-end approach leverages innovation and next-generation technologies to discover, secure, and govern data across the organization
    -Understand how BigID’s comprehensive platform and architecture is the cornerstone to a successful data privacy and protection solution

    *BigID has partnered with Protiviti and SAP to bring you this webinar. Your registration information will be shared with Protiviti and SAP separately. Please go to Protiviti and SAP’s Privacy Policy for more details
  • Automating Safe Data Analytics for Financial Services Recorded: Jun 11 2020 62 mins
    Speakers from BigID, Privitar and Amazon Web Services
    The advent of the data privacy era compounds the compliance and regulatory challenges that have held back many financial services institutions from executing data-driven strategies for growth and innovation. There is growing competitive pressure to better understand and respond to customer opportunities based on insights from data that enterprises process themselves, as well as from external data sources. However, global privacy compliance regulations, decentralized privacy governance and the risk inherent in sensitive data have resulted in cumbersome data management practices blocking the ability to use certain data in analytics workloads.

    Automating privacy risk minimization strategies can enable financial institutions to realize the benefits of accelerating analytics usage and keeping costs in check through services from cloud providers like Amazon Web Services (AWS).

    Join us for an in-depth look at how BigID and Privitar come together in AWS to:
    – Streamline data discovery to identify all data that needs to be protected
    – Apply a wide range of data privacy protections to that data to minimize risk
    – Provide analytics applications with rich and safe data in the cloud to unlock value

    With these capabilities, global financial organizations are ultimately empowered to accelerate their time to data in a safe and compliant manner.

    Speakers:

    Ilya Epshteyn, Principal Solutions Architect, AWS
    Sebastien Cognet, Privacy Engineer, Privitar
    Sachin Khungar, Senior Technical Architect, BigID
  • Threading the Needle: Building an End to End Approach to Data Rights Fulfillment Recorded: Jun 2 2020 56 mins
    Tomer Elias, Director, Product Management, BigID. Heather Federman, VP of Privacy and Policy, BigID
    Managing and fulfilling the new class of data rights afforded by landmark regulations like the EU’s GDPR and the California Consumer Privacy Act have long been identified as key operational challenges for privacy. However, as many organizations look to transition from manual efforts for compliance, they have encountered increasing levels of complexity for how these rights are addressed in practice. These include the underlying technical challenge of responding to requests with accurate and comprehensive data accounting, to maintaining multiple types of reports based on regulation and business policies, as well as managing the intake of requests and response workflows for a positive user experience.


    Join BigID’s VP of Privacy & Policy, Heather Federman and Director of Product Management, Tomer Elias for a dive deep into practical steps on streamlining and scaling the elements in the data request lifecycle to align with compliance and business objectives through an automated and flexible approach.


    After attending this web conference you will:

    -Understand the organizational impact of data subject’s rights fulfillment requirements and how data rights compliance can be aligned with business outcomes, like customer trust.
    -Gain awareness of potential solutions to roadblocks that can stand in the way of operationalizing DSAR management and streamline processes.
    -See how constructing and integrating an end to end approach to data rights can better enable privacy practitioners to respond to the current and future regulatory landscape.
    -Learn how to align advanced data rights request management with broader enterprise and data governance objectives for privacy protection.
  • One Data Map vs. Multitude of Data Definitions Recorded: May 27 2020 61 mins
    Heather Federman, BigID. Maureen Dry-Wasson, Allegis. Tara Cho, Womble Bond Dickinson
    Various legal regimes have differing definitions of what type of information is covered under the law. GDPR & Washington Privacy Act cover “personal data,” CCPA covers “Personal Information, the FTC covers “Personally Identifiable Information,” and then there are the various state data breach notification laws that delineate what type of information a company must notify a consumer about in the event of a breach. This presents a complicated landscape when it comes to operationalizing privacy; so how does an entity choose a simple, sound and effective approach? This session will cover some of those key data definitions and best practices that companies can leverage to keep track of their data holdings and associated compliance requirements.
  • Privacy in Perspective - Lessons Learned and Best Practices Two Years into GDPR Recorded: May 21 2020 64 mins
    Nimrod Vax, CPO at BigID, featuring Scott Margolis, Managing Director of Advisory Risk, EY
    Since the introduction of GDPR two years ago and CCPA six months ago, data privacy has taken the spotlight as organizations try to tackle the practical repercussions for sustainable compliance and how to scale and automate operations to address the requirements across a large number of disparate data sources.

    With the risk of both compliance penalties and consumer dissatisfaction if they’re unable to effectively and timely fulfill access and deletion requests, organizations need a foundation in place to accurately and continuously discover, classify, and map personal and sensitive information.

    Join us for an in-depth look at lessons learned so far from GDPR and CCPA, where we’ll explore:

    – Legislation and enforcement trends two years after GDPR came into effect
    – What are the best practices to prepare for CCPA, and key considerations?
    – How did organizations prioritize compliance use cases and define system scope?
    – How to minimize compliance violations and business risk with end-to-end data workflows
    – Subject access rights in practice
    – Requirements for data access rights and data deletion requests under CCPA
    – What is the path toward full automation for data subject requests?
    – How can organizations incorporate Opt out Management and Governance?
    – How to extend privacy compliance investments to achieve data governance objectives?

    *BigID has partnered with Ernst & Young to bring you this webinar. Your registration information will be shared with Ernst & Young. Please go to Ernst & Youngs’ Privacy Policy for more details
  • Discovery-in-Depth and the Privacy Imperative to Know Your Data Recorded: May 20 2020 62 mins
    Dimitri Sirota, Founder & CEO, BigID. Peggy Tsai, VP of Data Solutions, BigID.
    Learn how a discovery-in-depth approach is instrumental to meeting privacy regulations such as GDPR and CCPA - and why discovery-in-depth is the path to data intelligence. We’ll explore why data discovery is the foundation for successful privacy, security, and governance programs - and how to combine multiple modes of discovery to uncover actionable context around all types of regulated, personal, sensitive, and dark data.

    Join this session to see why data discovery is at the core of data intelligence, insight, and analysis – and needs to be both scalable and automated in order to successfully address the volume (and type) of data that organizations collect.

    This session will explore:

    -How discovery-in-depth is a differentiator in the privacy market
    -Why discovery is a critical factor in building out a comprehensive and automated catalog
    -Discovery & insight for the data you know - and the data you don’t
    -How to operationalize and automate compliance to privacy regulations
    -How data governance can help manage your sensitive and personal data
    -What’s new at BigID: from Data Quality to Data Retention
  • How to Effectively Reduce Cyber Risk Across the Enterprise Recorded: May 12 2020 57 mins
    Roger Hale, CSO, BigID; Liz Limjuco, Senior VP, Marsh; Elissa Doroff, VP and Product Manager, AXA XL
    With data ecosystems growing exponentially and risk environments constantly changing, it’s more important than ever to be able to identify, assess, and remediate risk wherever your data lives.

    Proactive risk management is the key to mitigating data breaches (and data leaks), essential for establishing a strong security framework for the enterprise, and necessary for effectively meeting data privacy and protection regulations. But it can be challenging to identify the best practices and most effective tools in the midst of a crowded cybersecurity marketplace.

    Join a live webinar with cyber experts from Marsh, AXA XL, and BigID to dive into:

    - How the risk landscape is evolving and financial stakes are rising as new regulations come on line
    - Cyber Catalyst program: Leveraging insurers’ insights to help companies grapple with data risk and solutions to manage it
    - Cyber risk outlook for 2020 and beyond: from data collection to ransomware, to supply chain risk and social engineering
    - Best practices for risk management for data at rest and data in motion
    - How to leverage ML driven data intelligence to reduce risk


    *BigID has partnered with Marsh and AXA XL to bring you this webinar. Your registration information will be shared with Marsh and AXA XL separately. Please go to Marsh and AXA XL’s Privacy Policy for more details
  • How to Save Time and Money on Your Privacy Program Recorded: May 7 2020 64 mins
    Justin Antonipillai, Founder and CEO, WireWheel. Dan Frank, Principal, Deloitte & Touche, LLP. Dimitri Sirota, Founder & CEO
    Privacy programs can be more than a necessary cost of doing business. As you develop a privacy program to comply with CCPA and other privacy laws, see how you can demonstrate measurable, long-term business value for your organization.

    Learn how the right technology and expertise unlocks data privacy ROI, as well as how to:

    - Increase your competitive advantage to attract consumers
    - Drive revenue by using data legally and ethically
    - Lower costs by operationalizing and automating privacy management

    Take a look at how best-of-breed privacy technology and services delivered by privacy experts are helping organizations implement proven practices and accelerate time to value.
  • Data as your Friend not Foe: Considerations for Privacy Professionals Recorded: May 5 2020 63 mins
    Michael McCullough, Macy's, Inc; Farah Zaman, Meredith Corporation; Pedro Pavon, Salesforce; Heather Federman, BigID
    Join executives from Macy's Inc, Salesforce, and the Meredith Corporation in a panel discussion to learn how building a proactive data governance program can address imminent privacy regulations.

    [Originally aired as part of the BigID Digital Summit: Examining the Intersection between Privacy and Governance]
  • How the Consumer Data Protection Landscape Drives and Defines Data Governance Recorded: May 5 2020 62 mins
    JoAnn Stonier, Mastercard; Chris Stephens, American Eagle Outfitters, Inc.; Tina Rosario, SAP; Peggy Tsai, BigID
    Join executives from Mastercard and American Eagle and learn how CDOs successfully work on building a defensible privacy framework while delivering on new data offerings to create real insights derived from data.

    [Originally aired as part of BigID's Digital Summit, Examining the Intersection of Privacy and Governance.
Privacy Automation for CCPA & GDPR
BigID aims to transform how enterprises protect and manage the privacy of personal data. Organizations are facing record breaches of personal information and proliferating global privacy regulations like the EU GDPR with fines reaching 4% of annual revenue.

Today enterprises lack dedicated purpose built technology to help them track and govern their customer data at scale. By bringing data science to data privacy, BigID aims to give enterprises the software to safeguard and steward the most important asset organizations manage: their customer data.

BigID has offices in the US and Israel and is founded by security industry veterans spanning the identity, data security, big data and governance markets.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Threading the Needle: Building an End to End Approach to Data Rights Fulfillment
  • Live at: Jun 2 2020 4:00 pm
  • Presented by: Tomer Elias, Director, Product Management, BigID. Heather Federman, VP of Privacy and Policy, BigID
  • From:
Your email has been sent.
or close