InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

How Authorization Enables Data Compliance, Privacy, & Cross-Border Access

Presented by

Gal Helemski, CIPO & Co-Founder - PlainID & Sam Tang, Managing Director, EY

About this talk

In the era of the digital economy, organizations grapple with complex cross-border data regulations. Efficient access control, powered by modern authorization, has emerged as a critical component in ensuring data compliance, privacy, and risk management. Join us and explore the role of authorization in navigating enterprise access control and cross-border regulatory challenges. Learn how centralized management of policies and distributed enforcement simplifies managing identities' access within regional norms, offering a targeted response to evolving data laws and advanced cyber threats. We will discuss how a modern authorization platform helps promote efficient management of access control, improve business agility, and bolster enterprise security through granular, policy-based controls. Key takeaways include: - Understanding the complexity of cross-border data regulations and the drivers behind it - Deep dive into how authorization is foundational in any security strategy for compliance and risk mitigation - Learning how modern authorization platforms simplify, and centralize management of access policies - The business case for policy-based, granular approach to data access and control
PlainID

PlainID

4567 subscribers64 talks
The Authorization Company
PlainID is the world's leading provider of enterprise Authorization, helping enterprises address the complex challenges of Identity Security. The PlainID Platform allows you to discover, manage, and authorize access control policies for enterprise applications and data. Our solution is architected to protect against identity-centric security threats powered by Policy-Based Access Control (PBAC).
Related topics