SlideShare a Scribd company logo
1 of 152
GDP(R)eady?
D a v i d E . W h e e l e r, S e n i o r P r o d u c t A r c h i t e c t
May 2018
Four Hacks to Mitigate
Breach Risk Under the GDPR
David E. Wheeler
S e n i o r P r o d u c t A r c h i t e c t
AGENDA
4
AGENDA
4
WHAT TO KNOW ABOUT THE GDPR?
AGENDA
4
WHAT TO KNOW ABOUT THE GDPR?
EMBRACE THE CORE TENANTS OF GDPR
AGENDA
4
WHAT TO KNOW ABOUT THE GDPR?
EMBRACE THE CORE TENANTS OF GDPR
HOW MFA REDUCES YOUR RISKS
AGENDA
4
WHAT TO KNOW ABOUT THE GDPR?
EMBRACE THE CORE TENANTS OF GDPR
HOW MFA REDUCES YOUR RISKS
ADDING SECURITY, NOT FRICTION
AGENDA
4
WHAT TO KNOW ABOUT THE GDPR?
EMBRACE THE CORE TENANTS OF GDPR
HOW MFA REDUCES YOUR RISKS
ADDING SECURITY, NOT FRICTION
SECURE THE WHOLE CUSTOMER JOURNEY
GDPR BASICS
GDPR BASICS
Rights and Responsibilities
6
What Is The GDPR?
6
General Data Protection Regulation
What Is The GDPR?
6
General Data Protection Regulation
Unified, Pan-European legislation
What Is The GDPR?
6
General Data Protection Regulation
Unified, Pan-European legislation
Affects 500m people
What Is The GDPR?
6
General Data Protection Regulation
Unified, Pan-European legislation
Affects 500m people
Applies to all who process EU subject data
What Is The GDPR?
7
What’s in the GDPR?
7
Rules for the processing of personal data
What’s in the GDPR?
7
Rules for the processing of personal data
Rules for the free movement of personal data
What’s in the GDPR?
7
Rules for the processing of personal data
Rules for the free movement of personal data
Protects fundamental personal rights & freedoms
What’s in the GDPR?
7
Rules for the processing of personal data
Rules for the free movement of personal data
Protects fundamental personal rights & freedoms
Especially right to the protection of personal data
What’s in the GDPR?
8
Top Five Operational Impacts
Privacy by Design and Data Minimization
8
Top Five Operational Impacts
1
Enhanced Requirements around Consent for Processing
Privacy by Design and Data Minimization
8
Top Five Operational Impacts
1
2
Enhanced Requirements around Consent for Processing
Privacy by Design and Data Minimization
8
Top Five Operational Impacts
1
2
Data Security and Breach Reporting3
Enhanced Requirements around Consent for Processing
Privacy by Design and Data Minimization
8
Top Five Operational Impacts
1
2
Data Security and Breach Reporting3
Pseudonymization4
Enhanced Requirements around Consent for Processing
Privacy by Design and Data Minimization
8
Top Five Operational Impacts
1
2
Data Security and Breach Reporting3
Pseudonymization4
Consequences for Violation5
HACK ONE
HACK ONE
Embrace Core Tenants of GDPR
10
Privacy by Design
10
Design with privacy as core principal
Privacy by Design
10
Design with privacy as core principal
Compliance, yes, but also…
Privacy by Design
10
Design with privacy as core principal
Compliance, yes, but also…
Better products
Privacy by Design
10
Design with privacy as core principal
Compliance, yes, but also…
Better products
Delightful experience
Privacy by Design
Personal Data Protection
Personal Data Protection
Birthday: 19 B BY
Government ID: 733-5
Shoe Size: 38
User Profile
Name: Luke Skywalker
Email: luke@lars.com
Address: Lars Homestead
Phone: 849-1138
Personal Data Protection
Birthday: 19 B BY
Government ID: 733-5
Shoe Size: 38
User Profile
Name: Luke Skywalker
Email: luke@lars.com
Address: Lars Homestead
Phone: 849-1138
Personal Data Protection
Birthday: 19 B BY
Government ID: 733-5
Shoe Size: 38
✅ Data Minimization
User Profile
Name: Luke Skywalker
Email: luke@lars.com
Address: Lars Homestead
Phone: 849-1138
Personal Data Protection
User Profile
Name: Luke Skywalker
Email: luke@lars.com
Address: Lars Homestead
Phone: 849-1138
Tokenizer
Personal Data Protection
Tokenizer
User Profile
Name: Luke Skywalker
Email: luke@lars.com
Address: Lars Homestead
Phone: 849-1138
Personal Data Protection
Tokenizer
User Profile
Name: Luke Skywalker
Email: luke@lars.com
Address: Lars Homestead
Phone: 849-1138
User Profile
Name: Gpz5S9xb9V07X
Email: jx8RuyLyAh4bG9j8x
Address: HXsfgdACIyPYKL
Phone: y4eAnsxzXR3fhAR
Personal Data Protection
Tokenizer
User Profile
Name: Luke Skywalker
Email: luke@lars.com
Address: Lars Homestead
Phone: 849-1138
User Profile
Name: Gpz5S9xb9V07X
Email: jx8RuyLyAh4bG9j8x
Address: HXsfgdACIyPYKL
Phone: y4eAnsxzXR3fhAR
Personal Data Protection
Tokenizer
User Profile
Name: Luke Skywalker
Email: luke@lars.com
Address: Lars Homestead
Phone: 849-1138
✅ Pseudonymization
🔒 Secure Data

Environment
User Profile
Name: Gpz5S9xb9V07X
Email: jx8RuyLyAh4bG9j8x
Address: HXsfgdACIyPYKL
Phone: y4eAnsxzXR3fhAR
Personal Data Protection
Tokenizer
User Profile
Name: Luke Skywalker
Email: luke@lars.com
Address: Lars Homestead
Phone: 849-1138
🔒 Secure Data

Environment
User Profile
Name: Gpz5S9xb9V07X
Email: jx8RuyLyAh4bG9j8x
Address: HXsfgdACIyPYKL
Phone: y4eAnsxzXR3fhAR
Personal Data Protection
Tokenizer
User Profile
Name: Luke Skywalker
Email: luke@lars.com
Address: Lars Homestead
Phone: 849-1138
✅ Data Security
2017 Verizon Data Breach Report
• 63% of confirmed breaches stemmed from
compromised credentials
2017 Verizon Data Breach Report
• 63% of confirmed breaches stemmed from
compromised credentials
• 81% of hacking-related breaches involved either
stolen or weak passwords
2017 Verizon Data Breach Report
HACK TWO
HACK TWO
Reduce Your Risk With MFA
MFA REQUIRES MULTIPLE “FACTORS”
MFA REQUIRES MULTIPLE “FACTORS”
Something you
KNOW
MFA REQUIRES MULTIPLE “FACTORS”
Something you
KNOW
MFA REQUIRES MULTIPLE “FACTORS”
Something you
HAVE
Something you
KNOW
MFA REQUIRES MULTIPLE “FACTORS”
Something you
HAVE
Something you
KNOW
MFA REQUIRES MULTIPLE “FACTORS”
Something you
HAVE
Something you
ARE
Something you
KNOW
MFA REQUIRES MULTIPLE “FACTORS”
Something you
HAVE
Something you
ARE
Something you
KNOW
MFA REQUIRES MULTIPLE “FACTORS”
Something you
HAVE
Something you
ARE
Something you
KNOW
MFA REQUIRES MULTIPLE “FACTORS”
B I G Q U E S T I O N : H OW TO M A K E M FA D E L I G H T F U L?
Something you
HAVE
Something you
ARE
Something you
KNOW
DEFINING MULTIFACTOR AUTHENTICATION
S T R O N G A N D F L E X I B L E AU T H E N T I C AT I O N
Something you
KNOW
DEFINING MULTIFACTOR AUTHENTICATION
S T R O N G A N D F L E X I B L E AU T H E N T I C AT I O N
Something you
KNOW
DEFINING MULTIFACTOR AUTHENTICATION
S T R O N G A N D F L E X I B L E AU T H E N T I C AT I O N
DEFINING MULTIFACTOR AUTHENTICATION
S T R O N G A N D F L E X I B L E AU T H E N T I C AT I O N
Something you
KNOW
DEFINING MULTIFACTOR AUTHENTICATION
S T R O N G A N D F L E X I B L E AU T H E N T I C AT I O N
Something you
KNOW
Something you
ARE
Identity
verified
DEFINING MULTIFACTOR AUTHENTICATION
S T R O N G A N D F L E X I B L E AU T H E N T I C AT I O N
Something you
KNOW
Something you
ARE
Identity
verified
DEFINING MULTIFACTOR AUTHENTICATION
S T R O N G A N D F L E X I B L E AU T H E N T I C AT I O N
Something you
KNOW
Something you
ARE
DEFINING MULTIFACTOR AUTHENTICATION
S T R O N G A N D F L E X I B L E AU T H E N T I C AT I O N
Something you
KNOW
Something you
ARE
Something you
HAVE
DEFINING MULTIFACTOR AUTHENTICATION
S T R O N G A N D F L E X I B L E AU T H E N T I C AT I O N
Something you
KNOW
Something you
ARE
Something you
HAVE
U N I F I E D , S I M P L I F I E D A N D P E R S O N A L I Z E D M FA F O R A N Y M O B I L E A P P
LAUNCHKEY
U N I F I E D , S I M P L I F I E D A N D P E R S O N A L I Z E D M FA F O R A N Y M O B I L E A P P
LAUNCHKEY
U N I F I E D , S I M P L I F I E D A N D P E R S O N A L I Z E D M FA F O R A N Y M O B I L E A P P
LAUNCHKEY
U N I F I E D , S I M P L I F I E D A N D P E R S O N A L I Z E D M FA F O R A N Y M O B I L E A P P
LAUNCHKEY
✅ Data

Minimization
© thoroughlyreviewed.com
© thoroughlyreviewed.com
IOVATION BANK now
iovationBank Web Auth Request
IOVATION BANK now
iovationBank Call Center Auth Request
IOVATION BANK now
iovationBank ATM Auth Request
IOVATION BANK now
iovationBank ATM Auth Request
HACK THREE
HACK THREE
Improve UX with Transparent Auth
Device Pairing
R E G I S T E R O R “ PA I R ” T H E D E V I C E D U R I N G T H E C U S TO M E R ’ S J O U R N E Y
Device Pairing
R E G I S T E R O R “ PA I R ” T H E D E V I C E D U R I N G T H E C U S TO M E R ’ S J O U R N E Y
INITIAL PAIRING
IP ADDRESS
GEOLOCATION
INITIAL PAIRING
IP ADDRESS
GEOLOCATION
SPOOFING EVASION
INITIAL PAIRING
IP ADDRESS JAILBROKEN
GEOLOCATION
SPOOFING EVASION
INITIAL PAIRING
IP ADDRESS JAILBROKEN
GEOLOCATION
SPOOFING
RECOGNITION
EVASION
INITIAL PAIRING
IP ADDRESS JAILBROKEN
GEOLOCATION
SPOOFING
RECOGNITION
EVASION
INITIAL PAIRING AUTHENTICATED
Persistent
Session
Token
Login
User
Access
Customer 

Access
Login
How Challenge Deferment Works
D E V I C E - B A S E D AU T H E N T I C AT I O N F O R B E T T E R C U S TO M E R E X P E R I E N C E
***
Persistent
Session
Token
Login
User
Access
Customer 

Access
Login
How Challenge Deferment Works
D E V I C E - B A S E D AU T H E N T I C AT I O N F O R B E T T E R C U S TO M E R E X P E R I E N C E
***
Persistent
Session
Token
Login
User
Access
Customer 

Access
Login
How Challenge Deferment Works
D E V I C E - B A S E D AU T H E N T I C AT I O N F O R B E T T E R C U S TO M E R E X P E R I E N C E
Account-to-
Device Pairing &
Risk Evaluation
Persistent
Session
Token
Login
User
Access
Customer 

Access
Login
How Challenge Deferment Works
D E V I C E - B A S E D AU T H E N T I C AT I O N F O R B E T T E R C U S TO M E R E X P E R I E N C E
Match Grant
Access
Account-to-
Device Pairing &
Risk Evaluation
Persistent
Session
Token
Login
User
Access
Customer 

Access
Login
How Challenge Deferment Works
D E V I C E - B A S E D AU T H E N T I C AT I O N F O R B E T T E R C U S TO M E R E X P E R I E N C E
Match Grant
Access
Account-to-
Device Pairing &
Risk Evaluation
No Match 

or
Risk Signals
• Rooted
• Jailbroken
• Anomalies
• Watchlist
• Tampering
• Emulator
Persistent
Session
Token
Login
User
Access
Customer 

Access
Login
How Challenge Deferment Works
D E V I C E - B A S E D AU T H E N T I C AT I O N F O R B E T T E R C U S TO M E R E X P E R I E N C E
Match Grant
Access
Account-to-
Device Pairing &
Risk Evaluation
No Match 

or
Risk Signals
• Rooted
• Jailbroken
• Anomalies
• Watchlist
• Tampering
• Emulator
Persistent
Session
Token
Login
User
Access
Customer 

Access
Login
Step-Up
***
How Challenge Deferment Works
D E V I C E - B A S E D AU T H E N T I C AT I O N F O R B E T T E R C U S TO M E R E X P E R I E N C E
Match Grant
Access
Account-to-
Device Pairing &
Risk Evaluation
No Match 

or
Risk Signals
• Rooted
• Jailbroken
• Anomalies
• Watchlist
• Tampering
• Emulator
Persistent
Session
Token
Login
User
Access
Customer 

Access
Login
Device
Registration
SUCCESS
Step-Up
***
How Challenge Deferment Works
D E V I C E - B A S E D AU T H E N T I C AT I O N F O R B E T T E R C U S TO M E R E X P E R I E N C E
Match Grant
Access
Account-to-
Device Pairing &
Risk Evaluation
No Match 

or
Risk Signals
• Rooted
• Jailbroken
• Anomalies
• Watchlist
• Tampering
• Emulator
Persistent
Session
Token
Login
User
Access
Customer 

Access
Login
Device
Registration
SUCCESS
Step-Up
***
How Challenge Deferment Works
D E V I C E - B A S E D AU T H E N T I C AT I O N F O R B E T T E R C U S TO M E R E X P E R I E N C E
CLEARKEY
A N E N G I N E F O R C O N T E X T A N D R I S K
DEVICE ID
GEOLOCATION
DEVICE INTEGRITY
ADDITIONAL
DEVICE CONTEXT
PAIRINGS
USER 1 ACCESS
CLEARKEY
A N E N G I N E F O R C O N T E X T A N D R I S K
DEVICE ID
GEOLOCATION
DEVICE INTEGRITY
ADDITIONAL
DEVICE CONTEXTUSER 1 ACCESS
PAIRINGS
CLEARKEY
A N E N G I N E F O R C O N T E X T A N D R I S K
DEVICE ID
GEOLOCATION
DEVICE INTEGRITY
ADDITIONAL
DEVICE CONTEXTUSER 1 ACCESS
+10
SCORE
PAIRINGS
CLEARKEY
A N E N G I N E F O R C O N T E X T A N D R I S K
DEVICE ID
GEOLOCATION
DEVICE INTEGRITY
ADDITIONAL
DEVICE CONTEXTUSER 1 ACCESS
Shopping
Resources

News
+10
SCORE
LOW RISK = Frictionless
Consumer Experience
PAIRINGS
CLEARKEY
A N E N G I N E F O R C O N T E X T A N D R I S K
DEVICE ID
GEOLOCATION
DEVICE INTEGRITY
ADDITIONAL
DEVICE CONTEXTUSER 2 ACCESS
PAIRINGS
CLEARKEY
A N E N G I N E F O R C O N T E X T A N D R I S K
DEVICE ID
GEOLOCATION
DEVICE INTEGRITY
ADDITIONAL
DEVICE CONTEXTUSER 2 ACCESS
0SCORE
PAIRINGS
CLEARKEY
A N E N G I N E F O R C O N T E X T A N D R I S K
DEVICE ID
GEOLOCATION
DEVICE INTEGRITY
ADDITIONAL
DEVICE CONTEXTUSER 2 ACCESS
USERNAME
&
PASSWORD
0SCORE
MEDIUM RISK= Moderate
Friction
PAIRINGS
CLEARKEY
A N E N G I N E F O R C O N T E X T A N D R I S K
DEVICE ID
GEOLOCATION
DEVICE INTEGRITY
ADDITIONAL
DEVICE CONTEXTUSER 3 ACCESS
PAIRINGS
CLEARKEY
A N E N G I N E F O R C O N T E X T A N D R I S K
DEVICE ID
GEOLOCATION
DEVICE INTEGRITY
ADDITIONAL
DEVICE CONTEXTUSER 3 ACCESS
-10SCORE
PAIRINGS
CLEARKEY
A N E N G I N E F O R C O N T E X T A N D R I S K
DEVICE ID
GEOLOCATION
DEVICE INTEGRITY
ADDITIONAL
DEVICE CONTEXTUSER 3 ACCESS
MFA
Challenge
-10SCORE
HIGH RISK=
Step-Up Authentication
PAIRINGS
🔒 Secure Data Environment
Perimeter Protection
🔒 Secure Data Environment
User Profile
Name: Gpz5S9xb9V07X
Email: jx8RuyLyAh4bG9j8x
Address: HXsfgdACIyPYKL
Phone: y4eAnsxzXR3fhAR
Perimeter Protection
🔒 Secure Data Environment
User Profile
Name: Gpz5S9xb9V07X
Email: jx8RuyLyAh4bG9j8x
Address: HXsfgdACIyPYKL
Phone: y4eAnsxzXR3fhAR
Perimeter Protection
Identity
verified
🔒 Secure Data Environment
User Profile
Name: Gpz5S9xb9V07X
Email: jx8RuyLyAh4bG9j8x
Address: HXsfgdACIyPYKL
Phone: y4eAnsxzXR3fhAR
Perimeter Protection
Identity
verified
HACK FOUR
HACK FOUR
Secure the Whole Customer Journey
LOGIN
CHANGE

ACCOUNT DETAILSCHECK BALANCES
TRANSFER MONEY


ACCOUNT CREATION /

LOAN ORIGINATION
MAKE OR SCHEDULE 

DEPOSITS
PAY BILLS
Securing the Customer Journey
LOGIN
CHANGE

ACCOUNT DETAILSCHECK BALANCES
TRANSFER MONEY


ACCOUNT CREATION /

LOAN ORIGINATION
MAKE OR SCHEDULE 

DEPOSITS
PAY BILLS
LaunchKey
MULTIFACTOR AUTHENTICATION
Securing the Customer Journey
LOGIN
CHANGE

ACCOUNT DETAILSCHECK BALANCES
TRANSFER MONEY


ACCOUNT CREATION /

LOAN ORIGINATION
MAKE OR SCHEDULE 

DEPOSITS
PAY BILLS
ClearKey
DEVICE-BASED AUTHENTICATION
LaunchKey
MULTIFACTOR AUTHENTICATION
Securing the Customer Journey
LOGIN
CHANGE

ACCOUNT DETAILSCHECK BALANCES
TRANSFER MONEY


ACCOUNT CREATION /

LOAN ORIGINATION
MAKE OR SCHEDULE 

DEPOSITS
PAY BILLS
ClearKey
DEVICE-BASED AUTHENTICATION
FraudForce
REPUTATION & FRAUD PREVENTION
LaunchKey
MULTIFACTOR AUTHENTICATION
Securing the Customer Journey
LOGIN
CHANGE

ACCOUNT DETAILSCHECK BALANCES
TRANSFER MONEY


ACCOUNT CREATION /

LOAN ORIGINATION
MAKE OR SCHEDULE 

DEPOSITS
PAY BILLS
ClearKey
DEVICE-BASED AUTHENTICATION
FraudForce
REPUTATION & FRAUD PREVENTION
IOVATION

FRAUDFORCE
LaunchKey
MULTIFACTOR AUTHENTICATION
Securing the Customer Journey
LOGIN
CHANGE

ACCOUNT DETAILSCHECK BALANCES
TRANSFER MONEY


ACCOUNT CREATION /

LOAN ORIGINATION
MAKE OR SCHEDULE 

DEPOSITS
PAY BILLS
ClearKey
DEVICE-BASED AUTHENTICATION
FraudForce
REPUTATION & FRAUD PREVENTION
IOVATION

FRAUDFORCE
LaunchKey
MULTIFACTOR AUTHENTICATION
Securing the Customer Journey
LOGIN
CHANGE

ACCOUNT DETAILSCHECK BALANCES
TRANSFER MONEY


ACCOUNT CREATION /

LOAN ORIGINATION
MAKE OR SCHEDULE 

DEPOSITS
PAY BILLS
ClearKey
DEVICE-BASED AUTHENTICATION
FraudForce
REPUTATION & FRAUD PREVENTION
IOVATION

FRAUDFORCE
LaunchKey
MULTIFACTOR AUTHENTICATION
Securing the Customer Journey
LOGIN
CHANGE

ACCOUNT DETAILSCHECK BALANCES
TRANSFER MONEY


ACCOUNT CREATION /

LOAN ORIGINATION
MAKE OR SCHEDULE 

DEPOSITS
PAY BILLS
ClearKey
DEVICE-BASED AUTHENTICATION
FraudForce
REPUTATION & FRAUD PREVENTION
IOVATION

FRAUDFORCE
LaunchKey
MULTIFACTOR AUTHENTICATION
FRAUDFORCE
Securing the Customer Journey
LOGIN
CHANGE

ACCOUNT DETAILSCHECK BALANCES
TRANSFER MONEY


ACCOUNT CREATION /

LOAN ORIGINATION
MAKE OR SCHEDULE 

DEPOSITS
PAY BILLS
ClearKey
DEVICE-BASED AUTHENTICATION
FraudForce
REPUTATION & FRAUD PREVENTION
IOVATION

FRAUDFORCE
LaunchKey
MULTIFACTOR AUTHENTICATION
FRAUDFORCE
Securing the Customer Journey
LOGIN
CHANGE

ACCOUNT DETAILSCHECK BALANCES
TRANSFER MONEY


ACCOUNT CREATION /

LOAN ORIGINATION
MAKE OR SCHEDULE 

DEPOSITS
PAY BILLS
ClearKey
DEVICE-BASED AUTHENTICATION
FraudForce
REPUTATION & FRAUD PREVENTION
IOVATION

FRAUDFORCE
LaunchKey
MULTIFACTOR AUTHENTICATION
FRAUDFORCE
Securing the Customer Journey
LOGIN
CHANGE

ACCOUNT DETAILSCHECK BALANCES
TRANSFER MONEY


ACCOUNT CREATION /

LOAN ORIGINATION
MAKE OR SCHEDULE 

DEPOSITS
PAY BILLS
ClearKey
DEVICE-BASED AUTHENTICATION
FraudForce
REPUTATION & FRAUD PREVENTION
IOVATION

FRAUDFORCE
LaunchKey
MULTIFACTOR AUTHENTICATION
FRAUDFORCE
Securing the Customer Journey
LOGIN
CHANGE

ACCOUNT DETAILSCHECK BALANCES
TRANSFER MONEY


ACCOUNT CREATION /

LOAN ORIGINATION
MAKE OR SCHEDULE 

DEPOSITS
PAY BILLS
ClearKey
DEVICE-BASED AUTHENTICATION
FraudForce
REPUTATION & FRAUD PREVENTION
IOVATION

FRAUDFORCE
LaunchKey
MULTIFACTOR AUTHENTICATION
FRAUDFORCE
FRAUDFORCE
Securing the Customer Journey
LOGIN
CHANGE

ACCOUNT DETAILSCHECK BALANCES
TRANSFER MONEY


ACCOUNT CREATION /

LOAN ORIGINATION
MAKE OR SCHEDULE 

DEPOSITS
PAY BILLS
ClearKey
DEVICE-BASED AUTHENTICATION
FraudForce
REPUTATION & FRAUD PREVENTION
IOVATION

FRAUDFORCE
LaunchKey
MULTIFACTOR AUTHENTICATION
FRAUDFORCE
FRAUDFORCE
Securing the Customer Journey
Balancing
Compliance
and User
Experience
Balancing
Compliance
and User
Experience
Balancing
Compliance
and User
Experience
Privacy by Design
Balancing
Compliance
and User
Experience
Privacy by Design
Data Minimization
Balancing
Compliance
and User
Experience
Privacy by Design
Data Minimization
Pseudonymization
Balancing
Compliance
and User
Experience
Privacy by Design
Data Minimization
Data Protection
Pseudonymization
Balancing
Compliance
and User
Experience
Privacy by Design
Data Minimization
Data Protection
Pseudonymization
Balancing
Compliance
and User
Experience
Privacy by Design
Data Minimization
Data Protection
Mobile Multifactor
Authentication
Pseudonymization
Balancing
Compliance
and User
Experience
Privacy by Design
Data Minimization
Data Protection
High Identity

Assurance
Mobile Multifactor
Authentication
Pseudonymization
Balancing
Compliance
and User
Experience
Privacy by Design
Data Minimization
Data Protection
High Identity

Assurance
Transparent

Authentication
Mobile Multifactor
Authentication
Pseudonymization
Balancing
Compliance
and User
Experience
Privacy by Design
Data Minimization
Data Protection
High Identity

Assurance
Transparent

Authentication
Mobile Multifactor
Authentication
Pseudonymization
Change-Tolerant

Recognition
Balancing
Compliance
and User
Experience
Privacy by Design
Data Minimization
Data Protection
High Identity

Assurance
Transparent

Authentication
Mobile Multifactor
Authentication
Risk Insight
Pseudonymization
Change-Tolerant

Recognition
Balancing
Compliance
and User
Experience
Privacy by Design
Data Minimization
Data Protection
High Identity

Assurance
Transparent

Authentication
Mobile Multifactor
Authentication
Reputation
Risk Insight
Pseudonymization
Change-Tolerant

Recognition
Visit www.iovation.com/GDPR-Readiness
Visit www.iovation.com/GDPR-Readiness
Visit www.iovation.com/GDPR-Readiness
On-Demand Webtalks
QUESTIONS?
www.iovation.com
@iovation
info@iovation.com
001.1.503.224-6010
David E. Wheeler
Senior Product Architect

More Related Content

Similar to 4 GDPR Hacks to Mitigate Breach Risks Post GDPR

Do You Trust Your Digital Assistant?
Do You Trust Your Digital Assistant? Do You Trust Your Digital Assistant?
Do You Trust Your Digital Assistant? GetCallers
 
Success Factors in Web & Mobile Product Development: Why We Say 'No' and Why ...
Success Factors in Web & Mobile Product Development: Why We Say 'No' and Why ...Success Factors in Web & Mobile Product Development: Why We Say 'No' and Why ...
Success Factors in Web & Mobile Product Development: Why We Say 'No' and Why ...Dolphin Micro, Inc.
 
Threat model of a remote worker | Infographic
Threat model of a remote worker | InfographicThreat model of a remote worker | Infographic
Threat model of a remote worker | InfographicDigital Shadows
 
App Development Company in USA | India
App Development Company in USA | IndiaApp Development Company in USA | India
App Development Company in USA | Indiadeorwine infotech
 
Fullscreen Digital - Retail business optimization solutions
Fullscreen Digital - Retail business optimization solutionsFullscreen Digital - Retail business optimization solutions
Fullscreen Digital - Retail business optimization solutionsFullscreen Digital
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101OneLogin
 
Why Insight Engines Matter in 2020 and Beyond
Why Insight Engines Matter in 2020 and BeyondWhy Insight Engines Matter in 2020 and Beyond
Why Insight Engines Matter in 2020 and BeyondLucidworks
 
Google Assistant & Alexa - Asystenci głosowi: możliwości, podobieństwa, różnice
Google Assistant & Alexa - Asystenci głosowi: możliwości, podobieństwa, różniceGoogle Assistant & Alexa - Asystenci głosowi: możliwości, podobieństwa, różnice
Google Assistant & Alexa - Asystenci głosowi: możliwości, podobieństwa, różniceArtur Skowroński
 
AWS Seminar Series 2015 Melbourne
AWS Seminar Series 2015 MelbourneAWS Seminar Series 2015 Melbourne
AWS Seminar Series 2015 MelbourneAmazon Web Services
 
#Productivity - {S:01 Ep:03}
#Productivity - {S:01 Ep:03} #Productivity - {S:01 Ep:03}
#Productivity - {S:01 Ep:03} Dimitar Danailov
 
The Consumerization of Authentication with iovation
The Consumerization of Authentication with iovationThe Consumerization of Authentication with iovation
The Consumerization of Authentication with iovationTransUnion
 
Afonso Rebelo de Sousa, LinkedIn - DMX Dublin 2016
Afonso Rebelo de Sousa, LinkedIn - DMX Dublin 2016Afonso Rebelo de Sousa, LinkedIn - DMX Dublin 2016
Afonso Rebelo de Sousa, LinkedIn - DMX Dublin 2016DMX Dublin
 
How to Market Your Security Company (1)
How to Market Your Security Company (1)How to Market Your Security Company (1)
How to Market Your Security Company (1)Chai Domingues
 
Kodak Strategy analysis and recommendation
Kodak Strategy analysis and recommendation Kodak Strategy analysis and recommendation
Kodak Strategy analysis and recommendation Trương Lan Hương
 
AWS Seminar Series 2015 Brisbane
AWS Seminar Series 2015 BrisbaneAWS Seminar Series 2015 Brisbane
AWS Seminar Series 2015 BrisbaneAmazon Web Services
 
Managing Technical Debt - WordCamp Orlando 2017
Managing Technical Debt - WordCamp Orlando 2017Managing Technical Debt - WordCamp Orlando 2017
Managing Technical Debt - WordCamp Orlando 2017Chad Windnagle
 

Similar to 4 GDPR Hacks to Mitigate Breach Risks Post GDPR (20)

Do You Trust Your Digital Assistant?
Do You Trust Your Digital Assistant? Do You Trust Your Digital Assistant?
Do You Trust Your Digital Assistant?
 
Cyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile WorldCyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile World
 
Success Factors in Web & Mobile Product Development: Why We Say 'No' and Why ...
Success Factors in Web & Mobile Product Development: Why We Say 'No' and Why ...Success Factors in Web & Mobile Product Development: Why We Say 'No' and Why ...
Success Factors in Web & Mobile Product Development: Why We Say 'No' and Why ...
 
Threat model of a remote worker | Infographic
Threat model of a remote worker | InfographicThreat model of a remote worker | Infographic
Threat model of a remote worker | Infographic
 
App Development Company in USA | India
App Development Company in USA | IndiaApp Development Company in USA | India
App Development Company in USA | India
 
Fullscreen Digital - Retail business optimization solutions
Fullscreen Digital - Retail business optimization solutionsFullscreen Digital - Retail business optimization solutions
Fullscreen Digital - Retail business optimization solutions
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
Why Insight Engines Matter in 2020 and Beyond
Why Insight Engines Matter in 2020 and BeyondWhy Insight Engines Matter in 2020 and Beyond
Why Insight Engines Matter in 2020 and Beyond
 
Google Assistant & Alexa - Asystenci głosowi: możliwości, podobieństwa, różnice
Google Assistant & Alexa - Asystenci głosowi: możliwości, podobieństwa, różniceGoogle Assistant & Alexa - Asystenci głosowi: możliwości, podobieństwa, różnice
Google Assistant & Alexa - Asystenci głosowi: możliwości, podobieństwa, różnice
 
AWS Seminar Series 2015 Melbourne
AWS Seminar Series 2015 MelbourneAWS Seminar Series 2015 Melbourne
AWS Seminar Series 2015 Melbourne
 
#Productivity - {S:01 Ep:03}
#Productivity - {S:01 Ep:03} #Productivity - {S:01 Ep:03}
#Productivity - {S:01 Ep:03}
 
AWS SeMINAR SERIES 2015 Sydney
AWS SeMINAR SERIES 2015 SydneyAWS SeMINAR SERIES 2015 Sydney
AWS SeMINAR SERIES 2015 Sydney
 
Identidad digital
Identidad digitalIdentidad digital
Identidad digital
 
The Consumerization of Authentication with iovation
The Consumerization of Authentication with iovationThe Consumerization of Authentication with iovation
The Consumerization of Authentication with iovation
 
Afonso Rebelo de Sousa, LinkedIn - DMX Dublin 2016
Afonso Rebelo de Sousa, LinkedIn - DMX Dublin 2016Afonso Rebelo de Sousa, LinkedIn - DMX Dublin 2016
Afonso Rebelo de Sousa, LinkedIn - DMX Dublin 2016
 
GDPR workshop
GDPR workshopGDPR workshop
GDPR workshop
 
How to Market Your Security Company (1)
How to Market Your Security Company (1)How to Market Your Security Company (1)
How to Market Your Security Company (1)
 
Kodak Strategy analysis and recommendation
Kodak Strategy analysis and recommendation Kodak Strategy analysis and recommendation
Kodak Strategy analysis and recommendation
 
AWS Seminar Series 2015 Brisbane
AWS Seminar Series 2015 BrisbaneAWS Seminar Series 2015 Brisbane
AWS Seminar Series 2015 Brisbane
 
Managing Technical Debt - WordCamp Orlando 2017
Managing Technical Debt - WordCamp Orlando 2017Managing Technical Debt - WordCamp Orlando 2017
Managing Technical Debt - WordCamp Orlando 2017
 

More from TransUnion

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...TransUnion
 
A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesTransUnion
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipTransUnion
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar TransUnion
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4TransUnion
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayTransUnion
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedTransUnion
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalTransUnion
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingTransUnion
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...TransUnion
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemTransUnion
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropeTransUnion
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsTransUnion
 
2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report HighlightsTransUnion
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityTransUnion
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...TransUnion
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...TransUnion
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...TransUnion
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...TransUnion
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...TransUnion
 

More from TransUnion (20)

Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
Leverage Gartner’s Insight for Assessing the Total Cost of Fraud in Your Paym...
 
A New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data StrategiesA New Imperative: Global Privacy and Data Strategies
A New Imperative: Global Privacy and Data Strategies
 
The Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data StewardshipThe Business Imperative for Identity, Trust and Data Stewardship
The Business Imperative for Identity, Trust and Data Stewardship
 
2020 i gaming report webinar
2020 i gaming report webinar 2020 i gaming report webinar
2020 i gaming report webinar
 
Financial services report webinar v4
Financial services report webinar v4Financial services report webinar v4
Financial services report webinar v4
 
Webinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to PlayWebinar: Roll Out the VIP Path to Play
Webinar: Roll Out the VIP Path to Play
 
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – DecodedPSD2, SCA and the EBA’s Opinion on SCA – Decoded
PSD2, SCA and the EBA’s Opinion on SCA – Decoded
 
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. CybercriminalCombating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
Combating Social Engineering and Account Takeover by a Former U.S. Cybercriminal
 
How Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost BrokingHow Confused.com and iovation Fight Ghost Broking
How Confused.com and iovation Fight Ghost Broking
 
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
Keeping Your Customers Happy and Safe: Authentication and Authorization Strat...
 
The Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud ProblemThe Insurance Digital Revolution Has a Fraud Problem
The Insurance Digital Revolution Has a Fraud Problem
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in Europe
 
How E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their CartsHow E-Commerce Providers Can Remove ATO from Their Carts
How E-Commerce Providers Can Remove ATO from Their Carts
 
2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights2019 iovation Gambling Industry Report Highlights
2019 iovation Gambling Industry Report Highlights
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
 
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
Definitive Guide to Next-generation Fraud Prevention: Techniques for the Mobi...
 
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
Fraud Prevention Strategies to Fight First-Party Fraud and Synthetic Identity...
 
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
Battling Credit Write-Offs by Identifying Synthetic Identity (Gartner Report ...
 
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...Working at the Margins: Change Agents in the Converged World (Gartner Report ...
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
 

Recently uploaded

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 

Recently uploaded (20)

Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 

4 GDPR Hacks to Mitigate Breach Risks Post GDPR