Information is currency in the 21st century...Is your data enabling you to drive the right digital transformation in your organisation? - Jasmit Sagoo, CTO, Veritas
How prepared are you when it comes to Data Privacy? Take the enterprise data privacy quiz to find out. Follow along and mark your answers to see how you stack against your peers or read the report here: http://bit.ly/1DUGMfH.
The state of data privacy with dimensional research Druva
Here are the slides from the Data Privacy webinar we hosted with Dimensional Research. Full access to the full data privacy report that's referenced in the slides, go here: http://bit.ly/1EoYo3r
Is your company prepared over the security and privacy of its data? Check out the 4 recommended aspects that we think deserve a bit more thought. http://bit.ly/1EqKe5P
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesDruva
Employees leave organizations each year, but did your sensitive data leave with them? Osterman Research found that 39% of companies are not sure that they have recovered all corporate data assets, posing a significant risk in terms of data breach, regulatory and compliance implications, while leaving IT trying to locate and contain sensitive information.
This presentation with Michael Osterman, president of Osterman Research, as he shares new research, and Drew Nielsen, Director of Enterprise Security, Druva. Key learnings include:
* Understanding your organization's data vulnerabilities for data exfiltration
* Recommended technologies, policies, and procedures to protect critical information
* Preparation that can save IT time from potential audits, investigations or litigation
Listen to the webcast: http://bit.ly/2loQU33
Data protection and privacy in the world of database DevOpsRed Gate Software
We dispel the myth that database DevOps and compliance can't go hand in hand. We begin with a brief look at how extending DevOps to the database lays solid foundations for data governance and compliance.
Our guest speaker is James Boother, Sales and Marketing Director at Coeo. Coeo are Europe's most trusted analytics and data management experts, with over 10 years’ experience delivering technology strategy and support for businesses who need to get the most from their data.
In a climate where data breaches are all too frequent, and more and more data lives in the cloud, the challenge of protecting your data can seem daunting.
James addresses the implications of the forthcoming GDPR on database management, highlighting requirements you may need to address. As well as offering guidance for assessing your data estate for GDPR readiness, James shares some great tools and tips for building data protection and privacy into your DevOps processes. With the right preparation, you can be fully compliant, with your data safe, whilst maintaining fast delivery of value to your end users.
New Strategies for More Effective Remote/Branch Office Data ProtectionDruva
Managing and protecting data across remote and branch offices (ROBO) is one of the top challenges IT teams face. Low bandwidth, insufficient infrastructure, and little-to-no onsite IT staff make protecting this data a struggle and this problem are further compounded by the number of sites within an organization.
In this on-demand webinar, Data Protection Analyst Jason Buffington at Enterprise Strategy Group (ESG) and Druva will provide new research on ROBO trends and how to best address the growing challenges presented by them.
Discussion topics:
- Trends affecting the ROBO landscape today
- How the cloud can ease the burden of data protection at remote locations
- Steps to build a centralized, scalable data protection program
To watch the on-demand version, please visit: http://bit.ly/ESGROBOSLIDESHARE
How prepared are you when it comes to Data Privacy? Take the enterprise data privacy quiz to find out. Follow along and mark your answers to see how you stack against your peers or read the report here: http://bit.ly/1DUGMfH.
The state of data privacy with dimensional research Druva
Here are the slides from the Data Privacy webinar we hosted with Dimensional Research. Full access to the full data privacy report that's referenced in the slides, go here: http://bit.ly/1EoYo3r
Is your company prepared over the security and privacy of its data? Check out the 4 recommended aspects that we think deserve a bit more thought. http://bit.ly/1EqKe5P
Protecting Corporate Data When an Employee Leaves: Survey and Best PracticesDruva
Employees leave organizations each year, but did your sensitive data leave with them? Osterman Research found that 39% of companies are not sure that they have recovered all corporate data assets, posing a significant risk in terms of data breach, regulatory and compliance implications, while leaving IT trying to locate and contain sensitive information.
This presentation with Michael Osterman, president of Osterman Research, as he shares new research, and Drew Nielsen, Director of Enterprise Security, Druva. Key learnings include:
* Understanding your organization's data vulnerabilities for data exfiltration
* Recommended technologies, policies, and procedures to protect critical information
* Preparation that can save IT time from potential audits, investigations or litigation
Listen to the webcast: http://bit.ly/2loQU33
Data protection and privacy in the world of database DevOpsRed Gate Software
We dispel the myth that database DevOps and compliance can't go hand in hand. We begin with a brief look at how extending DevOps to the database lays solid foundations for data governance and compliance.
Our guest speaker is James Boother, Sales and Marketing Director at Coeo. Coeo are Europe's most trusted analytics and data management experts, with over 10 years’ experience delivering technology strategy and support for businesses who need to get the most from their data.
In a climate where data breaches are all too frequent, and more and more data lives in the cloud, the challenge of protecting your data can seem daunting.
James addresses the implications of the forthcoming GDPR on database management, highlighting requirements you may need to address. As well as offering guidance for assessing your data estate for GDPR readiness, James shares some great tools and tips for building data protection and privacy into your DevOps processes. With the right preparation, you can be fully compliant, with your data safe, whilst maintaining fast delivery of value to your end users.
New Strategies for More Effective Remote/Branch Office Data ProtectionDruva
Managing and protecting data across remote and branch offices (ROBO) is one of the top challenges IT teams face. Low bandwidth, insufficient infrastructure, and little-to-no onsite IT staff make protecting this data a struggle and this problem are further compounded by the number of sites within an organization.
In this on-demand webinar, Data Protection Analyst Jason Buffington at Enterprise Strategy Group (ESG) and Druva will provide new research on ROBO trends and how to best address the growing challenges presented by them.
Discussion topics:
- Trends affecting the ROBO landscape today
- How the cloud can ease the burden of data protection at remote locations
- Steps to build a centralized, scalable data protection program
To watch the on-demand version, please visit: http://bit.ly/ESGROBOSLIDESHARE
Data Loss Prevention (DLP) - Fundamental Concept - ErykEryk Budi Pratama
Presented at APTIKNAS (Indonesia ICT Business Association) DKI Jakarta regular webinar.
Title:Data Loss Prevention: Fundamental Concept in Enabling DLP System
2 July 2020
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...AIIM International
Check out these webinar slides to learn the latest ways Office 365 is providing the tools to develop and implement a modern records management strategy to take charge of the data explosion.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/data-explosion-in-your-organization-harness-it-with-a-comprehensive-records-management-strategy
The GDPR requires organizations — both “data controllers” and “data processors” — to strengthen their data protection and security measures to protect the personally identifiable information (PII) of EU citizens, and to demonstrate their compliance at any time. See how Quest solutions can help make it easier to ensure that your customer on-premises, cloud or hybrid environment meets GDPR compliance requirements.
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykEryk Budi Pratama
Presented at Orang Siber Indonesia webinar.
11 July 2020
Topic: Data Protection: Basic Regulation and Technical Aspects
This presentation covers:
> Indonesia Data Protection Bill
> Data Masking
> Identity & Access Management
> Data Loss Prevention
Join us (for Indonesian):
t.me/orangsiber
t.me/dataprotectionid
This material was presented at Orang Siber Indonesia regular webinar.
Content:
> Understanding privacy management
> Global privacy news
> Understanding privacy regulations and frameworks
> Data Privacy Program Management practices
Presented at National Webinar of ISACA Student Group, Universitas Kristen Satya Wacana, indonesia.
Title: Cyber Resilience: Post COVID-19 - Welcoming New Normal
2 July 2020
Guardians of Trust: Building Trust in Data & AnalyticsEryk Budi Pratama
Presented at Absolut Data Event, 17 Dec 2019, at GoWork Kuningan.
Event URL: https://www.eventbrite.com/e/panel-discussion-what-will-you-prepare-with-data-in-2020-tickets-84851546259
My presentation summarized the two of KPMG publication related to Trust in Data & Analytics. The focus of this event was panel discussion.
Ref 1 : https://assets.kpmg/content/dam/kpmg/xx/pdf/2016/10/building-trust-in-analytics.pdf
Ref 2: https://assets.kpmg/content/dam/kpmg/xx/pdf/2018/02/guardians-of-trust.pdf
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...TrustArc
Watch the webinar on-demand: https://info.trustarc.com/benchmarking-gdpr-compliance-webinar.html
Register now to watch this on-demand webinar to learn:
- How companies are approaching the GDPR
- Where they are prioritizing their effort
- How much they expect to spend
- These benchmarks can help you position your own program internally and build a case for further investment.
To register for upcoming/on-demand webinars visit: https://www.trustarc.com/events/webinar-schedule/
Who Will Make the Grade?
With less than one year to go before the GDPR is enforced across Europe, how has the industry responded to the GDPR requirements and how many companies will make the grade by May 2018? Recent TrustArc research conducted by Dimensional Research found that over 61% of companies have not even started their GDPR Compliance programs. Of those that had started - the three challenges cited most by the privacy professionals surveyed were difficult to maintain and update privacy programs (57%), lack of appropriate tools and technology (56%), and lack of internal resources (54%).
Presented at ISACA Indonesia Monthly Technical Meeting, 11 Dec 2019 at Telkom Landmark.
Key takeaways from my presentation:
1. Cloud customers have to understand the share responsibilities between customer and cloud provider
2. Different cloud service model (IaaS, PaaS, SaaS) has different audit methodology
3. Customer’s IT Auditor have to be trained to have the skills needed to audit the cloud service
4. Understanding IAM in Cloud is very important. Each Cloud Service Provider has different IAM mechanism
5. Understanding different type of audit logs in cloud platform is important for IT Auditor
Where data security and value of data meet in the cloud ulf mattssonUlf Mattsson
Title: Where Data Security and Data Value Meet in the Cloud
Abstract:
The biggest challenge in this new paradigm of the cloud and an interconnected world, is merging data security with data value and productivity. What’s required is a seamless, boundless security framework to maximize data utility while minimizing risk. In this webinar, you’ll learn about value-preserving data-centric security methods, how to keep track of your data and monitor data access outside the enterprise, and best practices for protecting data and privacy in the perimeter-less enterprise.
BrightTALK webinar, January 14, 2014
Threat Ready Data: Protect Data from the Inside and the OutsideDLT Solutions
Is your current state really threat ready?
Amit Walia, Senior Vice President, General Manager of Data Integration and Security at Informatica, shares how to protect data from the inside and the outside from the 2015 Informatica Government Summit.
How to minimize scope for gdpr data protection compliance when using cloud se...Dirk Rünagel
With eperi Cloud Data Protection (CDP), you as a cloud user remain in control of all your data protection processes and ensure that your organization’s data protection compliance guidelines are centrally enforced.
eperi Cloud Data Protection is the only solution in the market that allows you to encrypt data in common business cloud applications while retaining their functionalities – like searching for specific content in archived Office 365 emails or using Salesforce reporting features.
All these functionalities remain while your sensitive information is stored only in an encrypted format. For you as a customer of a cloud application such as Office 365 or Salesforce, this means you are able to use all functionalities of innovative cloud applications without compromises due to data protection and compliance requirements. Your sensitive information stored in the cloud is protected against unauthorized access at all times.
GDPR Compliance: The eperi Gateway protects supplier data
A public organisation wants to store their files, among them surveillance videos and VM images, in the cloud. Due to Personally Identifiable Information (PII) being affected, the information has to be pseudonymised according to the EU General Data Protection Regulation (GDPR). With the eperi Gateway, the public organisation is able to encrypt and tokenise their data before it is sent to the cloud for processing.
MT29 Panel: Becoming a data-driven enterpriseDell EMC World
How do the automotive, banking, manufacturing, and technology industries drive innovation with data and analytics?
A distinguished panel of innovators and adopters of big data and analytics solutions will discuss their big data implementations and how they are harnessing their data to derive insights to transform their organizations.
We'll explore use cases ranging from managing and analyzing huge amounts of data to protect consumers and avoid product recalls, to building customer 360-degree views to better serve customers, to controlling wildfires to save lives, to tapping into genomic data to treat cancer.
We live in a time where digital technology is profoundly impacting our lives, from the way we connect with each other to how we interpret our world. First and foremost, this digital transformation is causing a tsunami of data. In fact, IDC estimates that in 2025, the world will create and replicate 163ZB of data, representing a tenfold increase from the amount of data created in 2016. In the past, organizations primarily dealt with documents and emails. But now they’re also dealing with instant messaging, text messaging, video files, images, and DIO files. The internet of things, or IOT, will only add to this explosion in data.
Managing this data overload and the variety of devices from which it is created is complicated and onerous as the market for solutions is fragmented and confusing. There are many categories of solutions, and within each, there are even more solutions to choose from. Many companies are struggling to decide how many of those solutions they need and where to start. Additionally, using multiple solutions means they won’t be integrated, so companies end up managing multiple applications from multiple disparate interfaces.
The question we often get asked is, “How can Microsoft 365 help me?”
GETTINGGDPR-READY MEANS SETTING UP A PRIVACY MANAGEMENT SYSTEM,
BEING ABLE TO SHOW IT AND KEEPING IT EFFECTIVE
A management system is a “living” entity which adapts to business context (new markets-products-services, M&A, demerge, law/policies changes, … ) and improves over time
Data Loss Prevention (DLP) - Fundamental Concept - ErykEryk Budi Pratama
Presented at APTIKNAS (Indonesia ICT Business Association) DKI Jakarta regular webinar.
Title:Data Loss Prevention: Fundamental Concept in Enabling DLP System
2 July 2020
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...AIIM International
Check out these webinar slides to learn the latest ways Office 365 is providing the tools to develop and implement a modern records management strategy to take charge of the data explosion.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/data-explosion-in-your-organization-harness-it-with-a-comprehensive-records-management-strategy
The GDPR requires organizations — both “data controllers” and “data processors” — to strengthen their data protection and security measures to protect the personally identifiable information (PII) of EU citizens, and to demonstrate their compliance at any time. See how Quest solutions can help make it easier to ensure that your customer on-premises, cloud or hybrid environment meets GDPR compliance requirements.
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykEryk Budi Pratama
Presented at Orang Siber Indonesia webinar.
11 July 2020
Topic: Data Protection: Basic Regulation and Technical Aspects
This presentation covers:
> Indonesia Data Protection Bill
> Data Masking
> Identity & Access Management
> Data Loss Prevention
Join us (for Indonesian):
t.me/orangsiber
t.me/dataprotectionid
This material was presented at Orang Siber Indonesia regular webinar.
Content:
> Understanding privacy management
> Global privacy news
> Understanding privacy regulations and frameworks
> Data Privacy Program Management practices
Presented at National Webinar of ISACA Student Group, Universitas Kristen Satya Wacana, indonesia.
Title: Cyber Resilience: Post COVID-19 - Welcoming New Normal
2 July 2020
Guardians of Trust: Building Trust in Data & AnalyticsEryk Budi Pratama
Presented at Absolut Data Event, 17 Dec 2019, at GoWork Kuningan.
Event URL: https://www.eventbrite.com/e/panel-discussion-what-will-you-prepare-with-data-in-2020-tickets-84851546259
My presentation summarized the two of KPMG publication related to Trust in Data & Analytics. The focus of this event was panel discussion.
Ref 1 : https://assets.kpmg/content/dam/kpmg/xx/pdf/2016/10/building-trust-in-analytics.pdf
Ref 2: https://assets.kpmg/content/dam/kpmg/xx/pdf/2018/02/guardians-of-trust.pdf
Benchmarking Your GDPR Compliance: Will You Make the Grade? [TrustArc Webinar...TrustArc
Watch the webinar on-demand: https://info.trustarc.com/benchmarking-gdpr-compliance-webinar.html
Register now to watch this on-demand webinar to learn:
- How companies are approaching the GDPR
- Where they are prioritizing their effort
- How much they expect to spend
- These benchmarks can help you position your own program internally and build a case for further investment.
To register for upcoming/on-demand webinars visit: https://www.trustarc.com/events/webinar-schedule/
Who Will Make the Grade?
With less than one year to go before the GDPR is enforced across Europe, how has the industry responded to the GDPR requirements and how many companies will make the grade by May 2018? Recent TrustArc research conducted by Dimensional Research found that over 61% of companies have not even started their GDPR Compliance programs. Of those that had started - the three challenges cited most by the privacy professionals surveyed were difficult to maintain and update privacy programs (57%), lack of appropriate tools and technology (56%), and lack of internal resources (54%).
Presented at ISACA Indonesia Monthly Technical Meeting, 11 Dec 2019 at Telkom Landmark.
Key takeaways from my presentation:
1. Cloud customers have to understand the share responsibilities between customer and cloud provider
2. Different cloud service model (IaaS, PaaS, SaaS) has different audit methodology
3. Customer’s IT Auditor have to be trained to have the skills needed to audit the cloud service
4. Understanding IAM in Cloud is very important. Each Cloud Service Provider has different IAM mechanism
5. Understanding different type of audit logs in cloud platform is important for IT Auditor
Where data security and value of data meet in the cloud ulf mattssonUlf Mattsson
Title: Where Data Security and Data Value Meet in the Cloud
Abstract:
The biggest challenge in this new paradigm of the cloud and an interconnected world, is merging data security with data value and productivity. What’s required is a seamless, boundless security framework to maximize data utility while minimizing risk. In this webinar, you’ll learn about value-preserving data-centric security methods, how to keep track of your data and monitor data access outside the enterprise, and best practices for protecting data and privacy in the perimeter-less enterprise.
BrightTALK webinar, January 14, 2014
Threat Ready Data: Protect Data from the Inside and the OutsideDLT Solutions
Is your current state really threat ready?
Amit Walia, Senior Vice President, General Manager of Data Integration and Security at Informatica, shares how to protect data from the inside and the outside from the 2015 Informatica Government Summit.
How to minimize scope for gdpr data protection compliance when using cloud se...Dirk Rünagel
With eperi Cloud Data Protection (CDP), you as a cloud user remain in control of all your data protection processes and ensure that your organization’s data protection compliance guidelines are centrally enforced.
eperi Cloud Data Protection is the only solution in the market that allows you to encrypt data in common business cloud applications while retaining their functionalities – like searching for specific content in archived Office 365 emails or using Salesforce reporting features.
All these functionalities remain while your sensitive information is stored only in an encrypted format. For you as a customer of a cloud application such as Office 365 or Salesforce, this means you are able to use all functionalities of innovative cloud applications without compromises due to data protection and compliance requirements. Your sensitive information stored in the cloud is protected against unauthorized access at all times.
GDPR Compliance: The eperi Gateway protects supplier data
A public organisation wants to store their files, among them surveillance videos and VM images, in the cloud. Due to Personally Identifiable Information (PII) being affected, the information has to be pseudonymised according to the EU General Data Protection Regulation (GDPR). With the eperi Gateway, the public organisation is able to encrypt and tokenise their data before it is sent to the cloud for processing.
MT29 Panel: Becoming a data-driven enterpriseDell EMC World
How do the automotive, banking, manufacturing, and technology industries drive innovation with data and analytics?
A distinguished panel of innovators and adopters of big data and analytics solutions will discuss their big data implementations and how they are harnessing their data to derive insights to transform their organizations.
We'll explore use cases ranging from managing and analyzing huge amounts of data to protect consumers and avoid product recalls, to building customer 360-degree views to better serve customers, to controlling wildfires to save lives, to tapping into genomic data to treat cancer.
We live in a time where digital technology is profoundly impacting our lives, from the way we connect with each other to how we interpret our world. First and foremost, this digital transformation is causing a tsunami of data. In fact, IDC estimates that in 2025, the world will create and replicate 163ZB of data, representing a tenfold increase from the amount of data created in 2016. In the past, organizations primarily dealt with documents and emails. But now they’re also dealing with instant messaging, text messaging, video files, images, and DIO files. The internet of things, or IOT, will only add to this explosion in data.
Managing this data overload and the variety of devices from which it is created is complicated and onerous as the market for solutions is fragmented and confusing. There are many categories of solutions, and within each, there are even more solutions to choose from. Many companies are struggling to decide how many of those solutions they need and where to start. Additionally, using multiple solutions means they won’t be integrated, so companies end up managing multiple applications from multiple disparate interfaces.
The question we often get asked is, “How can Microsoft 365 help me?”
GETTINGGDPR-READY MEANS SETTING UP A PRIVACY MANAGEMENT SYSTEM,
BEING ABLE TO SHOW IT AND KEEPING IT EFFECTIVE
A management system is a “living” entity which adapts to business context (new markets-products-services, M&A, demerge, law/policies changes, … ) and improves over time
Data loss is considered by security experts to be one of the most serious threats that businesses currently face.
Maintaining the confidentiality of personal information and data is an essential factor in operating a successful business. People must be able to trust that their service provider takes the appropriate measures to implement security controls that will ultimately protect their privacy.
However, some of the largest and most reputable organizations have fallen victim to data loss security breaches resulting in significant legal, financial, and reputation loss, including [1]:
The Bank of America: Losing the personal employee information of over one million employees
The United States Government: Losing data related to the military
Heartland Payment Systems: Transferring credit card information and other personal records of over 130 million customers
In 2013, it was estimated that data breaches had resulted in the exploitation of over 800 million personal records [2]. This number is also expected to rise over the next several years given the advanced tools that cybercriminals use to steal information and data.
Interestingly, it is not just cybercriminals who represent a threat as:
64% of data loss is caused by well-meaning insiders.
50% of employees leave with data.
$3.5 million average cost of a security breach.
Considering these extensive data breaches, it is practical for organizations to understand where their critical data is located and understanding current security controls that can stop data loss.
Data Loss Prevention (DLP) solutions locate critical and personal data for organizations and help prevent data loss. By having a deeper understanding of efficient DLP security controls, you will help protect the reputation of your organization.
For more information contact: rkopaee@riskview.ca
https://www.threatview.ca
http://www.riskview.ca
Keep Calm and Comply: 3 Keys to GDPR SuccessSirius
Recent surveys benchmarking the status of U.S. companies' efforts to meet the May 25 deadline for the EU Global Data Protection Regulation (GDPR) have revealed a startling lack of preparedness.
Companies not yet in compliance are likely to violate the directive if they don’t take immediate action, and fines can amount to 2-4 percent of a company’s annual gross revenue. Do you have the resources and information you need to comply?
View to learn:
--What GDPR means to your business
--Short, medium, and long-term actions you can take to protect regulated data and achieve compliance
--How you can streamline incident response and third-party risk management capabilities
--How to streamline the resources and technology needed to keep up with the evolving regulatory landscape
Don't fall behind on these compliance regulations. Take the steps needed to protect the data you collect.
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessSirius
The EU Global Data Protection Regulation (GDPR) and New York State Cybersecurity Requirements for Financial Services Companies (23 NYCRR 500) represent a landmark change in the global data protection space. While they originate in different countries and apply to different organizations, their primary message is the same:
Protect your data, or pay a steep price. More specifically, protect the sensitive data you collect from customers.
With deadlines looming, is your organization ready?
The time to act is now. Read more to learn:
--Key mandates and minimum requirements for compliance
--Why a comprehensive data-centric security strategy is invaluable to all data protection and data privacy efforts
--How you can gauge your organization’s incident response capabilities
--How to extend your focus beyond the organization’s figurative four walls to ensure requirements are met throughout your supply chain
The first New York requirements deadline has arrived. With the next deadline of mandates only 6 months away, you don't want to fall behind and leave your organization at risk for potential penalties and fines.
My keynote speech at the ISACA IIA Belgium software watch day in October 2014 in Brussels on the value of big data and data analytics for auditors and other assurance professionals
Intelligent compliance and risk management solutions.
First, we understand ‘compliance’ can have different meanings to various teams across enterprise. Compliance is an outcome of continuous risk management, involving compliance, risk, legal, privacy, security, IT and often even HR and finance teams which requires integrated approach to manage risk.
Let's start with the base pillar Compliance Management: compliance management is all about simplify risk assessment and mitigation in more automated way, providing visibility and insights to help meet compliance requirements.
Information Protection and Governance: we believe there is a huge opportunity for Microsoft to help our customers to know their data better, protect and govern data throughout its lifecycle in heterogenous environment. This is often the key starting point for many of our customers in their modern compliance journey – knowing what sensitive data they have, putting flexible, end-user friendly policies for both security and compliance outcomes, using more automation and intelligence.
Internal Risk Management: Internal risks are often what keeps business leaders up at night – regardless of negligent or malicious, identifying and being able to take action on internal risks are critical. The ability to quickly identify and manage risks from insiders (employees or contractors with corporate access) and minimize the negative impact on corporate compliance, competitive business position and brand reputation is a priority for organizations worldwide.
Last but not least, Discover and Respond: being able to discover relevant data for internal investigations, litigation, or regulatory requests and respond to them efficiently, and doing so without having to use multiple solutions and moving data in and out of systems to increase risk – is critical.
5 key steps for SMBs for reaching GDPR ComplianceGabor Farkas
In this GDPR Compliance presentation, you can learn more about the key steps to take for GDPR Compliance, including:
- What are data management processes and how to identify them at small and medium sized businesses
- What is personal data under the GDPR and how to establish a record of processing activities to map personal data
- How does encryption help with safeguarding personal data and ensuring GDPR compliance
- What your business should do to get ready for the new General Data Protection regulation on time
Date: 15th November 2017
Location: AI Lab Theatre
Time: 16:30 - 17:00
Speaker: Elisabeth Olafsdottir / Santiago Castro
Organisation: Microsoft / Keyrus
EXPERT WEBINAR: Convergence of Cybersecurity & Privacy with Herjavec GroupFeroot
With so much overlap between Privacy and Cybersecurity, why are we spending valuable resources duplicating efforts? Can there be more alignment and synergy between these two areas?
Join Tabitha Gallo of the Herjavec Group and Ivan Tsarynny of Feroot Privacy to start a discussion on Converging Privacy and Cybersecurity practices.
In this webinar, you will learn:
- How to effectively use, re-use and re-purpose existing operational processes and procedures (PCI, ISO and NERC) to satisfy privacy requirements
- What areas to extend existing cybersecurity processes to address GDPR, CCPA and other privacy laws
- New ways and opportunities for aligning privacy and cybersecurity and to become more synergistic
Learn more about Feroot software as an Automation & GDPR Compliance Tool: https://www.feroot.com/
Learn more about Herjavec Security & Privacy services: https://www.herjavecgroup.com/
Challenges & Opportunities the Data Privacy Act BringsRobert 'Bob' Reyes
My slide deck used in People Management Association of the Philippines' (PMAP) Data Privacy Act Forum held last 18 SEP 2017 at Ace Hotel & Suites, Pasig City.
(SACON) Ramkumar Narayanan - Personal Data Discovery & Mapping - Challenges f...Priyanka Aash
This session is about how to implement any privacy program in any organization - big or small - the foundational step is to understand what Personal Data an organization deals with, where it lies, how it flows (within & outside the organization), who does what with that data, what are the underlying assets involved, etc. Without this foundation, the organization cannot build the necessary controls required to implement and manage Privacy. However, this is not an easy probem to address. This session does a deep dive into the challenges faced, the methodologies used and tools that can be employed to build AND sustain an organization's data map.
Securing SharePoint, OneDrive, & Teams with Sensitivity LabelsDrew Madelung
How do you protect your confidential content from being exposed? Being able to secure your files and content across workloads is a necessity and the tools are available to you today in the Microsoft 365 Security admin center. Microsoft 365 Sensitivity Labels are the evolution of Azure Information Protection and more within the Microsoft Information Protection suite.
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Qualsys Ltd
Preparing for the new General Data Protection Regulation? Here is a presentation to help you to engage your employees with their new information security requirements. In this ppt presentation, you will find out: why GDPR, steps to manage compliance, important information security facts and some of the key articles.
Similar to CIO WaterCooler Focus: GDPR Jasmit Sagoo (20)
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
5. Guiding Principles & Considerations
5
Cross-functional team trained
in security, privacy and
compliance to remediate both
IT and business-managed
technology gaps
Lead with Policy and
Process. Reuse across
systems to solve once for
multiple gaps
Timing for Systems
Remediation must integrate
into the FY18 IT POR
Highlight effective use of
Veritas Products to
ensure compliance
Comply by May 2018 Risk-based Prioritization
6. 4 Steps to Information Governance
6
1
2
3
4
Create and apply retention policies; the same for Structured andUnstructured Personal Data
FINDAND ORGANISEYOUR PERSONAL DATALOCATE & MINIMISE
SEARCH
MONITOR
PROTECT
Find personal data quickly enough to meet the time limits for data subject requests, such as the right to
be forgotten (If you’ve completedStep 1 you’ll have much less data to search)
FIND DATATO BE FORGOTTEN – RESPONDTO SUBJECT ACCESS REQUESTS
Identify data breach within 72 hours and provide an audit trail of usage and movement of data
BE BREACH READY
Protect personal data from loss, damage, destruction and unlawful or unauthorized processing
(Back-up & Recovery, Archiving and Resiliency)
PROTECTWHATYOU KEEP
0 ENABLEMENT &
GOVERNANCE Create an organisation which promotes governance, provides leadership and drives Policy
EDUCATE LEADERSHIP, CREATE CORPORATE STRUCTURE
7. GDPR Program Structure for IT
7
Application
Remediation Structured
Data
Application
Remediation Un-
Structured Data
3rd Party Risk
Management
IT/Security Governance,
Risk and Compliance
8. Application Remediation – Unstructured Data
8
File/Print Servers
SharePoint
OneDrive
Email
280
TB of data
+
End user
device data
DataVisibility Data Retention
Discovery &
Response
Data Protection
NA
9. GDPR - ClassificationValidation Results
9
Personal Data (Employee,Customer, Supplier)
Data Points # Files
Total Files Scanned 9 Million
PII Hits - # Files 16,256
PII FilesAudited 3,311 (20%)
PII Confirmed Hits 3280 (99%)
False Positives 31 (<1%)
Files accessed in last 2 years 315,000 (3.5%)
Other Risks 186K db dumps
10. Most organizations are
here
Information Risk Management Maturity
StageTwo
Repeatable but
intuitiveStage One:
Initial/ad hoc
Stage Zero
Non existent
StageThree
Managed &
measurable
Stage Four
Optimized
12. Bringing ItTogether - Governing Data
12
MONITOR LOCATE
PROTECT SEARCH
MINIMIZE
PERSONAL
DATA
Uncover Personal Data
and make it visible
Article 30
What information are you
collecting and where is it
stored?
Make Personal Data
searchable
Articles 15, 16, 17, 18, 20
Subject access request
Intelligence & Indexing
Minimise and place controls
around Personal Data
Articles 5, 17, 32
Collection, Retention & Disposal
Protect Personal Data
from loss, damage or
breach
Articles 5, 25, 32, 33, 34
Data Protection
Ensure continual
adherence to GDPR
standards
Articles 5, 15, 16, 17, 18, 20,
24, 42, 44
Access controls
31. Next STEPS
1
2
3
GDPR Show and Tell
How Veritas can help you solve the challenges
How our products map to the GDPR framework
Veritas Risk Analyzer
GDPR Workshop
The Veritas view of the regulation
Critical first steps to GDPR compliance
GDPR Assessment
Veritas assessment to understand maturity
Leverage our tools to identify areas of personal data
Recommendations and Plan of Action
Help define and scope project
32. When digital compliance is done right, it’s like a
caterpillar turning into a butterfly, but when
done wrong, all you have is a really fast
caterpillar.”
GeorgeWesterman
Principal Research Scientist
MIT Sloan Initiative on the Digital Economy
32