To view the full webinar recording, visit: https://info.trustarc.com/managing-ccpa-gdpr-individual-rights-dsar-compliance.html?utm_source=slideshare
One of the most visible and complex requirements to achieve CCPA (California Consumer Privacy Act) and GDPR (General Data Protection Regulation) compliance is managing data subject access requests (DSAR), also known as individual rights or consumer rights. Recent IAPP / TrustArc benchmarking research indicates over 75% of companies have received a DSAR request, but only 33% have started to automate the management process.
This webinar will cover the following:
-Review the similarities and differences in the subject rights request requirements for CCPA and GDPR compliance
-Provide best practices to build an end to end management process and tools to help automate the CCPA and GDPR compliance process.
-Offer guidance from privacy experts who understand the regulatory requirements and have hands-on experience building and implementing successful CCPA and GDPR compliance programs
To view the full webinar recording, visit: https://info.trustarc.com/managing-ccpa-gdpr-individual-rights-dsar-compliance.html?utm_source=slideshare
Watch the webinar on-demand: https://info.trustarc.com/managing-gdpr-hipaa-apec-iso27001-compliance-webinar.html
While the GDPR has dominated the compliance agenda for the past two years, and will continue to be a major focus of attention for the foreseeable future, the reality is most companies have to address a wide range of other privacy regulations encompassing multiple jurisdictions and sectors.
Watch this on-demand webinar now where we review some of the top global compliance priorities and provide insights and best practices into how to balance multiple, complex compliance priorities across your organization.
To register for upcoming/on-demand webinars visit: https://www.trustarc.com/events/webinar-schedule/
https://info.trustarc.com/managing-gdpr-hipaa-apec-iso27001-compliance-webinar.html
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...TrustArc
A comprehensive new IAPP / TrustArc research report reviews what nearly 500 companies across EU, US and Asia are doing to comply with the GDPR. Key results include: How many DPIAs are being conducted? Are companies creating data inventories? How many data subject access rights requests are they receiving? What type of tools are they using to manage compliance? What other types of assessments are they conducting? And much more.
Join us to hear from the report’s authors on their key takeaways from the research, how you can use this information to secure budget next year and best practices to manage ongoing GDPR compliance.
In this webinar as our speakers will provide valuable insights into:
-Data on what other organizations are doing
-Thoughts on emerging best practices
-How technology can help automate certain GDPR tasks
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]TrustArc
Watch the webinar on-demand: https://info.trustarc.com/what-gdpr-means-for-your-cybersecurity-strategy-webinar.html
In this highly-connected world, there is potential for even the most secure networks to be compromised. With the GDPR bringing increased fines and heightened consumer expectations on how consumer data is handled, there’s additional pressure on your company’s cybersecurity strategy to stay one step ahead. A focus on preventative measures needs to become more sophisticated with a multi-layered approach to cybersecurity and ongoing risk management.
Watch this on-demand webinar now to look at the role the CISO plays in managing GDPR compliance, the role of tools such as anonymisation and integrated assessments, and how the privacy team can partner effectively with the security team.
To register for upcoming/on-demand webinars visit: https://www.trustarc.com/events/webinar-schedule/
https://info.trustarc.com/what-gdpr-means-for-your-cybersecurity-strategy-webinar.html
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020Delphix
With the California Consumer Privacy Act (CCPA) going into effect in 2020, organizations must comply with a new set of sweeping provisions designed to protect the privacy of consumer data. Organizations inside and outside of the state must assess their exposure to CCPA, then quickly transform how they process, share, and protect sensitive data.
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]TrustArc
Watch the webinar on-demand: https://info.trustarc.com/72-hours-notice-incident-response-management-under-gdpr-webinar.html
Best practices and suggested tools for addressing Articles 33 and 34 of the GDPR.
The GDPR calls for significant changes in how companies plan for and respond to a data breach. This webinar will provide best practices and suggested tools for addressing Articles 33 and 34 of the GDPR.
Register NOW for this on-demand webinar as we discuss key items such as:
- Addressing the new 72 hour notification requirement
- Revising your security policies
- Launching new employee training programs
#trustarcGDPRevents
To register for upcoming/on-demand webinars visit: https://www.trustarc.com/events/webinar-schedule/
Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...TrustArc
Watch the webinar on-demand: https://info.trustarc.com/demonstrating-compliance-certification-role-gdpr-webinar.html
The role of certification in GDPR compliance and broader global interoperability of privacy frameworks
The EU GDPR creates a new compliance standard – demonstrable accountability. As companies respond increasingly requests from partners to confirm their GDPR compliance status, many are looking for the best way to do this. Articles 42-43 of the GDPR includes provision for Certification bodies to assess compliance and in certain instances issue an EU Data Protection Seal.
What are the requirements for certification, how will these programs be operated and how soon will they be available to companies?
Watch this webinar on-demand as our speakers:
- Review the legal framework
- Discuss the role of certification in GDPR compliance and broader global interoperability of privacy frameworks
To register for upcoming/on-demand webinars visit: https://www.trustarc.com/events/webinar-schedule/
Managing Consent and Legitimate Interests Under the GDPR [Webinar Slides]TrustArc
Watch the webinar on-demand: https://info.trustarc.com/managing-consents-legitimate-interests-under-gdpr.html
Consent management remains a hot topic and has generated a lot of questions and uncertainty.
The GDPR has raised the bar with new requirements on companies to justify their use of EU personal data. And while relying on consent is not the only legal option available, it’s successfully put GDPR at the top of every inbox as consumers have been submerged in emails from companies urging them to “stay in touch” or “not miss out”. Are these emails really necessary? What do I need to include in my privacy notice or consent form? What kind of records do I need if a regulator asks?
With a divergence of opinion, consent management remains a hot topic and has generated a lot of questions and uncertainty.
Register now for this on-demand webinar where we reviewed:
-The GDPR requirements on determining the legal basis for processing
-The most recent guidance from regulators on seeking consent
- Sample consent forms, legitimate interests assessments and other best practice examples
To register for upcoming/on-demand webinars visit: https://www.trustarc.com/events/webinar-schedule/
Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]TrustArc
Watch the webinar on-demand: https://info.trustarc.com/best-practices-for-managing-individual-rights-under-gdpr-webinar.html
Insights and best practices for managing individual rights under the GDPR.
The GDPR introduces new individual rights for consumers such as the right of deletion, rectification and data portability - and non-compliance can lead to the highest level of fines. Many regulators are planning consumer campaigns that are likely to increase awareness and action on these new data subject access rights once the GDPR comes into effect on May 25th. What are your obligations? What volume of requests should a company prepare for? What best practices and tools are available to support these new requirements?
This on-demand webinar will provide insights and best practices for managing individual rights under the GDPR.
#trustarcGDPRevents
To register for upcoming/on-demand webinars visit: https://www.trustarc.com/events/webinar-schedule/
Watch the webinar on-demand: https://info.trustarc.com/managing-gdpr-hipaa-apec-iso27001-compliance-webinar.html
While the GDPR has dominated the compliance agenda for the past two years, and will continue to be a major focus of attention for the foreseeable future, the reality is most companies have to address a wide range of other privacy regulations encompassing multiple jurisdictions and sectors.
Watch this on-demand webinar now where we review some of the top global compliance priorities and provide insights and best practices into how to balance multiple, complex compliance priorities across your organization.
To register for upcoming/on-demand webinars visit: https://www.trustarc.com/events/webinar-schedule/
https://info.trustarc.com/managing-gdpr-hipaa-apec-iso27001-compliance-webinar.html
Privacy Risk Management - Emerging Trends, Benchmarking Research and Best Pra...TrustArc
A comprehensive new IAPP / TrustArc research report reviews what nearly 500 companies across EU, US and Asia are doing to comply with the GDPR. Key results include: How many DPIAs are being conducted? Are companies creating data inventories? How many data subject access rights requests are they receiving? What type of tools are they using to manage compliance? What other types of assessments are they conducting? And much more.
Join us to hear from the report’s authors on their key takeaways from the research, how you can use this information to secure budget next year and best practices to manage ongoing GDPR compliance.
In this webinar as our speakers will provide valuable insights into:
-Data on what other organizations are doing
-Thoughts on emerging best practices
-How technology can help automate certain GDPR tasks
What the GDPR Means for your Cybersecurity Strategy [Webinar Slides]TrustArc
Watch the webinar on-demand: https://info.trustarc.com/what-gdpr-means-for-your-cybersecurity-strategy-webinar.html
In this highly-connected world, there is potential for even the most secure networks to be compromised. With the GDPR bringing increased fines and heightened consumer expectations on how consumer data is handled, there’s additional pressure on your company’s cybersecurity strategy to stay one step ahead. A focus on preventative measures needs to become more sophisticated with a multi-layered approach to cybersecurity and ongoing risk management.
Watch this on-demand webinar now to look at the role the CISO plays in managing GDPR compliance, the role of tools such as anonymisation and integrated assessments, and how the privacy team can partner effectively with the security team.
To register for upcoming/on-demand webinars visit: https://www.trustarc.com/events/webinar-schedule/
https://info.trustarc.com/what-gdpr-means-for-your-cybersecurity-strategy-webinar.html
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020Delphix
With the California Consumer Privacy Act (CCPA) going into effect in 2020, organizations must comply with a new set of sweeping provisions designed to protect the privacy of consumer data. Organizations inside and outside of the state must assess their exposure to CCPA, then quickly transform how they process, share, and protect sensitive data.
72 Hours Notice: Incident Response Management under the GDPR [Webinar Slides]TrustArc
Watch the webinar on-demand: https://info.trustarc.com/72-hours-notice-incident-response-management-under-gdpr-webinar.html
Best practices and suggested tools for addressing Articles 33 and 34 of the GDPR.
The GDPR calls for significant changes in how companies plan for and respond to a data breach. This webinar will provide best practices and suggested tools for addressing Articles 33 and 34 of the GDPR.
Register NOW for this on-demand webinar as we discuss key items such as:
- Addressing the new 72 hour notification requirement
- Revising your security policies
- Launching new employee training programs
#trustarcGDPRevents
To register for upcoming/on-demand webinars visit: https://www.trustarc.com/events/webinar-schedule/
Demonstrating Compliance & the Role of Certification Under the GDPR [Webinar ...TrustArc
Watch the webinar on-demand: https://info.trustarc.com/demonstrating-compliance-certification-role-gdpr-webinar.html
The role of certification in GDPR compliance and broader global interoperability of privacy frameworks
The EU GDPR creates a new compliance standard – demonstrable accountability. As companies respond increasingly requests from partners to confirm their GDPR compliance status, many are looking for the best way to do this. Articles 42-43 of the GDPR includes provision for Certification bodies to assess compliance and in certain instances issue an EU Data Protection Seal.
What are the requirements for certification, how will these programs be operated and how soon will they be available to companies?
Watch this webinar on-demand as our speakers:
- Review the legal framework
- Discuss the role of certification in GDPR compliance and broader global interoperability of privacy frameworks
To register for upcoming/on-demand webinars visit: https://www.trustarc.com/events/webinar-schedule/
Managing Consent and Legitimate Interests Under the GDPR [Webinar Slides]TrustArc
Watch the webinar on-demand: https://info.trustarc.com/managing-consents-legitimate-interests-under-gdpr.html
Consent management remains a hot topic and has generated a lot of questions and uncertainty.
The GDPR has raised the bar with new requirements on companies to justify their use of EU personal data. And while relying on consent is not the only legal option available, it’s successfully put GDPR at the top of every inbox as consumers have been submerged in emails from companies urging them to “stay in touch” or “not miss out”. Are these emails really necessary? What do I need to include in my privacy notice or consent form? What kind of records do I need if a regulator asks?
With a divergence of opinion, consent management remains a hot topic and has generated a lot of questions and uncertainty.
Register now for this on-demand webinar where we reviewed:
-The GDPR requirements on determining the legal basis for processing
-The most recent guidance from regulators on seeking consent
- Sample consent forms, legitimate interests assessments and other best practice examples
To register for upcoming/on-demand webinars visit: https://www.trustarc.com/events/webinar-schedule/
Best Practices for Managing Individual Rights under the GDPR [Webinar Slides]TrustArc
Watch the webinar on-demand: https://info.trustarc.com/best-practices-for-managing-individual-rights-under-gdpr-webinar.html
Insights and best practices for managing individual rights under the GDPR.
The GDPR introduces new individual rights for consumers such as the right of deletion, rectification and data portability - and non-compliance can lead to the highest level of fines. Many regulators are planning consumer campaigns that are likely to increase awareness and action on these new data subject access rights once the GDPR comes into effect on May 25th. What are your obligations? What volume of requests should a company prepare for? What best practices and tools are available to support these new requirements?
This on-demand webinar will provide insights and best practices for managing individual rights under the GDPR.
#trustarcGDPRevents
To register for upcoming/on-demand webinars visit: https://www.trustarc.com/events/webinar-schedule/
Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]TrustArc
Watch the webinar on-demand: https://info.trustarc.com/profiling-big-data-consent-gdpr-webinar.html
Required Changes around Profiling & Consent for GDPR Compliance
Some of the most closely followed areas of the GDPR negotiations concerned profiling and consent. Profiling, as defined in Articles 4 & 22, is one of the new provisions in the Regulation which could have a significant impact on businesses seeking to use targeted marketing and other analytics for business growth. Consent remains a legal basis for processing but it’s been restricted under the GDPR and must be “freely given, specific, informed and unambiguous.” There is lots of discussion and privacy scare stories around these two areas alone.
Watch this webinar on-demand where we examine:
- the details of the profiling and consent requirements in the GDPR to help determine what is and isn’t in scope for profiling
- where you can and can’t rely on consent
- what solutions are available and how privacy leaders can work with their business and marketing teams to ensure compliance
To register for upcoming/on-demand webinars visit: https://www.trustarc.com/events/webinar-schedule/
ROI of Privacy: Building a Case for Investment [Webinar Slides]TrustArc
Watch the webinar on-demand: https://info.truste.com/roi-of-privacy-webinar.html
When building a case for privacy investment, privacy pros need to arm themselves with as many ROI metrics of their privacy program as possible. How to get those metrics and how to present them (whether they tie to direct or indirect dollars) is an art form that everyone can work on perfecting.
IAPP and TRUSTe collaborated in the on-demand webinar to discuss the recently published IAPP report, “Getting to the ROI of Privacy”, which offers some persuasive reasons a solid privacy program is worth paying for. Emily Leach, CIPP/US IAPP’s Knowledge Manager were joined by privacy leaders to share their key insights.
To register for upcoming other TRUSTe Webinars (upcoming/on-demand) visit: https://www.truste.com/events/privacy-insight-webinar-schedule/
Today’s organizations give predominant importance to increased privacy regulations, stakeholder’s profitability demands and the ever so changing consumer privacy expectations. As a result, the emphasis on personal data is growing and the companies are facing complicated reputational, regulatory and data privacy risk environment. It’s a sad fact that the frequency of critical data breaches are increasing and as a result the management administration and the IT departments focus on safeguarding their data systems more than ever before. Our experienced and expertise data security, privacy and information governance experts in UAE helps you to reduce the risks associated with various privacy compliance frameworks along with recognizing the value of your personal data.
Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]TrustArc
Watch the webinar on-demand: https://info.trustarc.com/building-pia-dpia-program-webinar.html
DPIA/PIA guidance, tips for success and case studies from the field.
The GDPR mandates Privacy by Design and requires documented Data Protection Impact Assessments (DPIAs) for high risk processing. How can you build this into a sustainable program across your business? Having a good understanding of what DPIA/PIAs are and how to implement them can be the key to embedding privacy in the heart of your organization as well as achieving GDPR compliance.
Watch this webinar on-demand to:
- Hear PIA best practices
- Review GDPR compliance requirements
- Receive a range of tips and tools to help streamline and embed the process
- Hear how Volvo Financial Services has approached assessments across their organization
To register for upcoming/on-demand webinars visit: https://www.trustarc.com/events/webinar-schedule/
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...TrustArc
In May 2020, TrustArc conducted a comprehensive Global Privacy Benchmarks Survey of more than 1,500 senior executives, privacy office leaders, privacy team members, management, and full-time employees outside the privacy function. The survey findings include benchmarking data on how companies are managing their privacy programs, how they are complying with privacy requirements, and how new technologies are impacting existing practices.
Join this webinar to see how you stack up against your peers and gain insights into how companies are addressing the formidable challenges of privacy in 2020.
This webinar will review:
-How companies’ priorities and strategic approaches to data security and privacy are evolving and the most challenging elements of privacy management
-CCPA compliance readiness and key challenges
-The expected impact of COVID-19 and new technologies on the privacy function
GDPR: it's big, but it's not impossible.
With GDPR looming on the horizon, it’s understandable organisations might be worried. Few companies have stood up and declared compliance yet. Most are heads down identifying personal data and implementing plans for compliance. There are hurried glances at the clock as the time to 25 May ticks away; the reality of daunting fines comes ever closer.
General Data Protection Regulation (GDPR) Implications for Canadian Firmsaccenture
The General Data Protection Regulation (GDPR) represents significant challenges for financial institutions to comply with the new data processing and record keeping requirements. This Accenture Finance & Risk presentation explores the impact of GDPR on Canadian firms, including lessons learned from our work with clients and knowledge gained that can be used for an effective GDPR journey.
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...TrustArc
Watch the webinar on-demand: https://info.trustarc.com/mastering-article-30-compliance-webinar.html
78% of companies need help with conducting a data inventory.
As businesses grapple with the requirements of the GDPR one of the most challenging is the need to create a comprehensive record of all of your data processing activities as required under Article 30 of the GDPR. Recent research from Dimensional Research/TrustArc found that 78% of companies said they needed help with conducting a data inventory. With a project of this scale why re-invent the wheel when you can learn from other privacy professionals who have gone through the process of scoping, communicating, managing and delivering a comprehensive data inventory and mapping project.
Watch this webinar on-demand to hear from in-house privacy professionals and consultants how to:
- build a business case for the data inventory
- involve other departments across the business
- understand benefits of different methodologies – such as a systems or process-based approach
- review the tools and technologies available to help for you
- maintain the inventory over time
To register for upcoming/on-demand webinars visit: https://www.trustarc.com/events/webinar-schedule/
Guardians of Trust: Building Trust in Data & AnalyticsEryk Budi Pratama
Presented at Absolut Data Event, 17 Dec 2019, at GoWork Kuningan.
Event URL: https://www.eventbrite.com/e/panel-discussion-what-will-you-prepare-with-data-in-2020-tickets-84851546259
My presentation summarized the two of KPMG publication related to Trust in Data & Analytics. The focus of this event was panel discussion.
Ref 1 : https://assets.kpmg/content/dam/kpmg/xx/pdf/2016/10/building-trust-in-analytics.pdf
Ref 2: https://assets.kpmg/content/dam/kpmg/xx/pdf/2018/02/guardians-of-trust.pdf
Beyond GDPR Compliance - Role of Internal AuditOmo Osagiede
More than the requirement to comply with the regulation, GDPR encourages good practices for data privacy and data protection beyond May 2018. This slide deck shares examples of areas where Internal Audit can play a significant role in ensuring that the right controls are built-in at the front-end of the compliance journey. This is in-line with the increasing expectation from stakeholders for IA to add value to more strategic areas of risk to the business.
Do you have customers residing in California? If so, you need to prepare yourself for the California Consumer Privacy Act (CCPA) going into effect in January 2020. CCPA mandates data privacy protection for California consumers much like GDPR. Personal information for consumers, households, and devices is covered and it is broadly applied. It’s not just names and addresses or personal identifiers like driver’s license and social security number but includes: geolocation data; records of personal property; products or services purchased, obtained, or even considered for purchase; browsing history; education information; professional information; and more. And you need to know where all that information is.
In order to ensure compliance, it’s time to put data profiling to work! You need rapid insight into your data sources whether on traditional platforms or in your data lake, and you need to find the outliers, not just cursory review of data samples, that help you ensure you’ve identified all the places this information has spread to as the information has been copied, reported, and delivered from central data stores.
View this webinar on-demand where we talk through some of the salient points of CCPA and show you how to leverage Trillium Discovery to profile, assess, and evaluate the data sources to find this data at risk.
5 Signs Your Privacy Management Program is Not Working for YouTrustArc
GDPR, CCPA, and other privacy regulations have forced companies over the last five years to focus on building out a privacy management program regardless of their size or maturity. Privacy management can range from ad hoc decentralized spreadsheets to fully- optimized, technology- backed solutions, depending on the resources and support provided.
Whether you pulled together the bare minimum compliance requirements or built out an end-to-end privacy management program, the goal is to provide your internal stakeholders actionable insights to make strategic data-driven decisions.
Join this webinar to learn the five signs that signal your privacy management program isn’t built to last and find out how you can get on the road to recovery.
Key takeaways:
- The five signs that signal your privacy management program isn’t built to last
- What a privacy management program should include to provide actionable insights to make strategic data-driven decisions
ControlCases discusses the following:
– Healthcare compliance in general
– What is HIPAA
– What is HITRUST
– How do they relate?
– Advantages of being HITRUST certified
ControlCase discusses the following: - What is GDPR? - How will it impact me? - How can I become compliant? - What is the timeline? - What are consequences if not met?
GDPR is the most significant change to data protection in a generation and an imminent global issue that will dominate data privacy, management and regulation discussions in 2017. According to recent research, over half of businesses lack preparedness for GDPR. With a quarter of the EU’s grace period over and with fines of up to €20 million (or 4% of global turnover), there is a lot at stake for companies falling behind the May 2018 deadline. So, where do you start?
Join renowned information security consultant and GDPR expert, Brian Honan, along with Tim Erlin, Senior Director, Security and IT Risk Strategist at Tripwire as they walk you through the essential steps to accelerate your GDPR preparedness.
In this session you will learn:
• The key facts about the GDPR regulations
• The implications of the new rules and how they will impact your business
• Practical steps your business can take to prepare
• How your existing security frameworks (ISO/NIST/CSC) can help set the foundation
• How Tripwire can help
TBEX 2018 - Digital Security and GDPR Considerations for the Travel and Hospi...Omo Osagiede
This presentation covers topical issues in cybersecurity impacting brands operating within the travel and hospitality industry. I talk about recent data breaches including Point-of-Sale terminal compromises which are a significant issue affecting that industry.
I also shared some GDPR action points for brands and bloggers/ digital media /content creators serving those industries.
This was presented at the 2018 Travel Blog Exchange (TBEX) Ostrava, Czech Republic #TBEXOstrava2018
Following the GDPR, the CCPA quickly presented additional and different requirements that organizations must include in their privacy programs if they are subject to the regulation. With more disclosures surrounding personal information required, privacy is not limited to a designated office - stakeholders from various departments must be aware of and take ownership of activities within their functional realms.
Now, more than ever, we are seeing a blend of the privacy and security roles, and it is not uncommon to see Chief Information Security Officers (CISOs) heavily involved in privacy risk activities. Whether it’s taking data inventory and assessing risk to having a rock solid data breach response plan in place, CISOs provide the security component that is critical for a successful CCPA compliance plan.
-The CISOs role in CCPA compliance
-Potential risks to the security and privacy of sensitive information
-Mapping CCPA requirements to security processes and procedures
7 Key GDPR Requirements & the Role of Data GovernanceDATUM LLC
GDPR is less than a year away. How is your organization making sure it will avoid penalties, fines and punishments? All organizations need to familiarize themselves with the new GDPR requirements and data subject rights as the first step to preventing fines and penalties. This presentation will look at the key requirements of GDPR and certain “best practices” approaches towards company-wide compliance. This presentation was given by Jonathan Adams, Research Director, at the MDM & Data Governance Summit on October 12, 2017 in New York City.
Whether you're using spreadsheets or the first generation privacy technology tools available - privacy management can still be a time-consuming and manual process for the privacy team and the broader business. Automation and intelligence are the key to streamlining this process but where to start?
In this webinar we've assembled some of the best privacy and security professionals to share their tips to cut out the time-consuming work so that you can focus on strategic input. CONSIDER: Just imagine what you could accomplish and influence if even 25% of your time was freed from manual processes.
This webinar will provide insights into:
-How to determine what activities to automate
-Key considerations for assessing tools and vendors
-Making the business case to increase the efficiencies and effectiveness of the privacy office
Profiling, Big Data & Consent Under the GDPR [TrustArc Webinar Slides]TrustArc
Watch the webinar on-demand: https://info.trustarc.com/profiling-big-data-consent-gdpr-webinar.html
Required Changes around Profiling & Consent for GDPR Compliance
Some of the most closely followed areas of the GDPR negotiations concerned profiling and consent. Profiling, as defined in Articles 4 & 22, is one of the new provisions in the Regulation which could have a significant impact on businesses seeking to use targeted marketing and other analytics for business growth. Consent remains a legal basis for processing but it’s been restricted under the GDPR and must be “freely given, specific, informed and unambiguous.” There is lots of discussion and privacy scare stories around these two areas alone.
Watch this webinar on-demand where we examine:
- the details of the profiling and consent requirements in the GDPR to help determine what is and isn’t in scope for profiling
- where you can and can’t rely on consent
- what solutions are available and how privacy leaders can work with their business and marketing teams to ensure compliance
To register for upcoming/on-demand webinars visit: https://www.trustarc.com/events/webinar-schedule/
ROI of Privacy: Building a Case for Investment [Webinar Slides]TrustArc
Watch the webinar on-demand: https://info.truste.com/roi-of-privacy-webinar.html
When building a case for privacy investment, privacy pros need to arm themselves with as many ROI metrics of their privacy program as possible. How to get those metrics and how to present them (whether they tie to direct or indirect dollars) is an art form that everyone can work on perfecting.
IAPP and TRUSTe collaborated in the on-demand webinar to discuss the recently published IAPP report, “Getting to the ROI of Privacy”, which offers some persuasive reasons a solid privacy program is worth paying for. Emily Leach, CIPP/US IAPP’s Knowledge Manager were joined by privacy leaders to share their key insights.
To register for upcoming other TRUSTe Webinars (upcoming/on-demand) visit: https://www.truste.com/events/privacy-insight-webinar-schedule/
Today’s organizations give predominant importance to increased privacy regulations, stakeholder’s profitability demands and the ever so changing consumer privacy expectations. As a result, the emphasis on personal data is growing and the companies are facing complicated reputational, regulatory and data privacy risk environment. It’s a sad fact that the frequency of critical data breaches are increasing and as a result the management administration and the IT departments focus on safeguarding their data systems more than ever before. Our experienced and expertise data security, privacy and information governance experts in UAE helps you to reduce the risks associated with various privacy compliance frameworks along with recognizing the value of your personal data.
Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]TrustArc
Watch the webinar on-demand: https://info.trustarc.com/building-pia-dpia-program-webinar.html
DPIA/PIA guidance, tips for success and case studies from the field.
The GDPR mandates Privacy by Design and requires documented Data Protection Impact Assessments (DPIAs) for high risk processing. How can you build this into a sustainable program across your business? Having a good understanding of what DPIA/PIAs are and how to implement them can be the key to embedding privacy in the heart of your organization as well as achieving GDPR compliance.
Watch this webinar on-demand to:
- Hear PIA best practices
- Review GDPR compliance requirements
- Receive a range of tips and tools to help streamline and embed the process
- Hear how Volvo Financial Services has approached assessments across their organization
To register for upcoming/on-demand webinars visit: https://www.trustarc.com/events/webinar-schedule/
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...TrustArc
In May 2020, TrustArc conducted a comprehensive Global Privacy Benchmarks Survey of more than 1,500 senior executives, privacy office leaders, privacy team members, management, and full-time employees outside the privacy function. The survey findings include benchmarking data on how companies are managing their privacy programs, how they are complying with privacy requirements, and how new technologies are impacting existing practices.
Join this webinar to see how you stack up against your peers and gain insights into how companies are addressing the formidable challenges of privacy in 2020.
This webinar will review:
-How companies’ priorities and strategic approaches to data security and privacy are evolving and the most challenging elements of privacy management
-CCPA compliance readiness and key challenges
-The expected impact of COVID-19 and new technologies on the privacy function
GDPR: it's big, but it's not impossible.
With GDPR looming on the horizon, it’s understandable organisations might be worried. Few companies have stood up and declared compliance yet. Most are heads down identifying personal data and implementing plans for compliance. There are hurried glances at the clock as the time to 25 May ticks away; the reality of daunting fines comes ever closer.
General Data Protection Regulation (GDPR) Implications for Canadian Firmsaccenture
The General Data Protection Regulation (GDPR) represents significant challenges for financial institutions to comply with the new data processing and record keeping requirements. This Accenture Finance & Risk presentation explores the impact of GDPR on Canadian firms, including lessons learned from our work with clients and knowledge gained that can be used for an effective GDPR journey.
Mastering Article 30 Compliance: Conducting, Maintaining & Reporting on your ...TrustArc
Watch the webinar on-demand: https://info.trustarc.com/mastering-article-30-compliance-webinar.html
78% of companies need help with conducting a data inventory.
As businesses grapple with the requirements of the GDPR one of the most challenging is the need to create a comprehensive record of all of your data processing activities as required under Article 30 of the GDPR. Recent research from Dimensional Research/TrustArc found that 78% of companies said they needed help with conducting a data inventory. With a project of this scale why re-invent the wheel when you can learn from other privacy professionals who have gone through the process of scoping, communicating, managing and delivering a comprehensive data inventory and mapping project.
Watch this webinar on-demand to hear from in-house privacy professionals and consultants how to:
- build a business case for the data inventory
- involve other departments across the business
- understand benefits of different methodologies – such as a systems or process-based approach
- review the tools and technologies available to help for you
- maintain the inventory over time
To register for upcoming/on-demand webinars visit: https://www.trustarc.com/events/webinar-schedule/
Guardians of Trust: Building Trust in Data & AnalyticsEryk Budi Pratama
Presented at Absolut Data Event, 17 Dec 2019, at GoWork Kuningan.
Event URL: https://www.eventbrite.com/e/panel-discussion-what-will-you-prepare-with-data-in-2020-tickets-84851546259
My presentation summarized the two of KPMG publication related to Trust in Data & Analytics. The focus of this event was panel discussion.
Ref 1 : https://assets.kpmg/content/dam/kpmg/xx/pdf/2016/10/building-trust-in-analytics.pdf
Ref 2: https://assets.kpmg/content/dam/kpmg/xx/pdf/2018/02/guardians-of-trust.pdf
Beyond GDPR Compliance - Role of Internal AuditOmo Osagiede
More than the requirement to comply with the regulation, GDPR encourages good practices for data privacy and data protection beyond May 2018. This slide deck shares examples of areas where Internal Audit can play a significant role in ensuring that the right controls are built-in at the front-end of the compliance journey. This is in-line with the increasing expectation from stakeholders for IA to add value to more strategic areas of risk to the business.
Do you have customers residing in California? If so, you need to prepare yourself for the California Consumer Privacy Act (CCPA) going into effect in January 2020. CCPA mandates data privacy protection for California consumers much like GDPR. Personal information for consumers, households, and devices is covered and it is broadly applied. It’s not just names and addresses or personal identifiers like driver’s license and social security number but includes: geolocation data; records of personal property; products or services purchased, obtained, or even considered for purchase; browsing history; education information; professional information; and more. And you need to know where all that information is.
In order to ensure compliance, it’s time to put data profiling to work! You need rapid insight into your data sources whether on traditional platforms or in your data lake, and you need to find the outliers, not just cursory review of data samples, that help you ensure you’ve identified all the places this information has spread to as the information has been copied, reported, and delivered from central data stores.
View this webinar on-demand where we talk through some of the salient points of CCPA and show you how to leverage Trillium Discovery to profile, assess, and evaluate the data sources to find this data at risk.
5 Signs Your Privacy Management Program is Not Working for YouTrustArc
GDPR, CCPA, and other privacy regulations have forced companies over the last five years to focus on building out a privacy management program regardless of their size or maturity. Privacy management can range from ad hoc decentralized spreadsheets to fully- optimized, technology- backed solutions, depending on the resources and support provided.
Whether you pulled together the bare minimum compliance requirements or built out an end-to-end privacy management program, the goal is to provide your internal stakeholders actionable insights to make strategic data-driven decisions.
Join this webinar to learn the five signs that signal your privacy management program isn’t built to last and find out how you can get on the road to recovery.
Key takeaways:
- The five signs that signal your privacy management program isn’t built to last
- What a privacy management program should include to provide actionable insights to make strategic data-driven decisions
ControlCases discusses the following:
– Healthcare compliance in general
– What is HIPAA
– What is HITRUST
– How do they relate?
– Advantages of being HITRUST certified
ControlCase discusses the following: - What is GDPR? - How will it impact me? - How can I become compliant? - What is the timeline? - What are consequences if not met?
GDPR is the most significant change to data protection in a generation and an imminent global issue that will dominate data privacy, management and regulation discussions in 2017. According to recent research, over half of businesses lack preparedness for GDPR. With a quarter of the EU’s grace period over and with fines of up to €20 million (or 4% of global turnover), there is a lot at stake for companies falling behind the May 2018 deadline. So, where do you start?
Join renowned information security consultant and GDPR expert, Brian Honan, along with Tim Erlin, Senior Director, Security and IT Risk Strategist at Tripwire as they walk you through the essential steps to accelerate your GDPR preparedness.
In this session you will learn:
• The key facts about the GDPR regulations
• The implications of the new rules and how they will impact your business
• Practical steps your business can take to prepare
• How your existing security frameworks (ISO/NIST/CSC) can help set the foundation
• How Tripwire can help
TBEX 2018 - Digital Security and GDPR Considerations for the Travel and Hospi...Omo Osagiede
This presentation covers topical issues in cybersecurity impacting brands operating within the travel and hospitality industry. I talk about recent data breaches including Point-of-Sale terminal compromises which are a significant issue affecting that industry.
I also shared some GDPR action points for brands and bloggers/ digital media /content creators serving those industries.
This was presented at the 2018 Travel Blog Exchange (TBEX) Ostrava, Czech Republic #TBEXOstrava2018
Following the GDPR, the CCPA quickly presented additional and different requirements that organizations must include in their privacy programs if they are subject to the regulation. With more disclosures surrounding personal information required, privacy is not limited to a designated office - stakeholders from various departments must be aware of and take ownership of activities within their functional realms.
Now, more than ever, we are seeing a blend of the privacy and security roles, and it is not uncommon to see Chief Information Security Officers (CISOs) heavily involved in privacy risk activities. Whether it’s taking data inventory and assessing risk to having a rock solid data breach response plan in place, CISOs provide the security component that is critical for a successful CCPA compliance plan.
-The CISOs role in CCPA compliance
-Potential risks to the security and privacy of sensitive information
-Mapping CCPA requirements to security processes and procedures
7 Key GDPR Requirements & the Role of Data GovernanceDATUM LLC
GDPR is less than a year away. How is your organization making sure it will avoid penalties, fines and punishments? All organizations need to familiarize themselves with the new GDPR requirements and data subject rights as the first step to preventing fines and penalties. This presentation will look at the key requirements of GDPR and certain “best practices” approaches towards company-wide compliance. This presentation was given by Jonathan Adams, Research Director, at the MDM & Data Governance Summit on October 12, 2017 in New York City.
Whether you're using spreadsheets or the first generation privacy technology tools available - privacy management can still be a time-consuming and manual process for the privacy team and the broader business. Automation and intelligence are the key to streamlining this process but where to start?
In this webinar we've assembled some of the best privacy and security professionals to share their tips to cut out the time-consuming work so that you can focus on strategic input. CONSIDER: Just imagine what you could accomplish and influence if even 25% of your time was freed from manual processes.
This webinar will provide insights into:
-How to determine what activities to automate
-Key considerations for assessing tools and vendors
-Making the business case to increase the efficiencies and effectiveness of the privacy office
2019 09-26 leveraging the power of automated intelligence for privacy managementTrustArc
With the increasing prevalence of privacy technology, how can the privacy industry leverage the benefits of artificial intelligence and machine learning to drive efficiencies in privacy program management? Many papers have been written on managing the potential privacy issues of automated decision-making, but far fewer on how the profession can utilize the benefits of technology to automate and simplify privacy program management.
Privacy tools are starting to leverage technology to incorporate powerful algorithms to automate repetitive, time-consuming tasks. Automation can generate significant cost and time savings, increase quality, and free up the privacy office’s limited resources to focus on more substantive and strategic work. This session will bring together expert panelists who can share examples of leveraging intelligence within a wide variety of privacy management functions.
Key takeaways from this webinar:
-Understand the difference between artificial Intelligence, machine learning, intelligent systems and algorithms
-Hear examples of the benefits of using intelligence to manage privacy compliance
-Understand how to incorporate intelligence into your internal program and/or client programs to improve efficiencies
Organizations response to vendor risk management from their customers is a task that is increasingly taking valuable time and resources for already busy security/compliance experts. In the webinar, ControlCase will cover the following:
What is being done currently to respond to vendors
How to make vendor management responses to customers more efficient
Technologies that can help in making the process better
How can ControlCase assist customers in this endeavor through it Continuous Compliance offering
Q&A
Presentation slides from DVV Solutions Third Party Risk Breakfast Briefing March 2019 looking into the issues and opportunities to develop stronger metrics, ROI and measurable business benefits from the investment in Third Party Risk Assessment programs
Choosing the Right Cybersecurity Services: A Guide for Businessesbasilmph
In today's business landscape, cybersecurity is vital for all businesses, regardless of their size or industry. Shockingly, cyberattacks have increased by 67% in the past year, impacting companies worldwide.
ControlCase covers the following:
- About PCI DSS, ISO 27001, NERC, HIPAA, FISMA and EI3PA
- Components for Continuous Compliance Monitoring within IT Standards/Regulations
- Recurrence Frequency and Calendar
- Challenges in Continuous Compliance Monitoring
Event Monitoring: Use Powerful Insights to Improve Performance and SecurityDreamforce
Salesforce runs its business on Salesforce, but it supports its business using log data to the tune of three terabytes of data per day, per pod. Log data answers questions like who's logging in, who's downloading the customer list, which Visualforce pages are the slowest, which API versions you should upgrade, who's adopting Salesforce and how, and much, much more. Event Monitoring - part of Salesforce Shield is now generally available to provide insights into your org activity like never before. Join us to learn how you can use this built-in premium service to support your organization with powerful insights. Watch the video now: https://www.youtube.com/watch?v=QlESjd5aNDY
Storm Telematics deploys advanced fleet and asset optimization solutions with sophisticated analytic reporting and dashboard tools. This allows for the delivery of greater operational efficiencies and cost savings to be delivered to our clients. The following Buyer's Guide is provided as a courtesy to assist in identifying critical elements as part of a due diligence process in selecting a solution provider. Enjoy.
Understanding New Technology and Security Risks as you respond to COVID-19Emma Kelly
As world economies reopen, businesses must adjust their risk management posture for the “new normal”, while continuing to drive digital transformation initiatives. The “new normal” has brought change to key risk vectors across people, process, and technology. To enable effective financial and operational controls, business teams must adapt to these changes and fully understand these new technology and security risks.
A key change has been a move to a work from home workforce. Organizations must rethink their approach to approach to enabling employee access to key enterprise systems and sensitive data.
In this session, we will share our thoughts on where new risks have emerged and traditional risks have changed. In addition, we will provide a point of view on the latest technologies and techniques to help you assess and control risks in enterprise systems that enable business finance and operations management.
Join SafePaaS CEO Adil Khan and Director Dan Miller at Altum Strategy Group.
On-demand recording link:https://info.trustarc.com/WB-2019-06-19-GDPR-Compliance-Convince-Customers-Partners-Board.html?utm_source=slideshare
Many companies have invested significant time and resources trying to design and implement GDPR compliance programs. Internally, they may have generated hundreds or thousands of pages of project plans, policies, processes and reports – including records of processing, DPIA reports and much more. But how can you demonstrate to internal stakeholders, clients and partners that you have a comprehensive program and that your processes and products are GDPR-compliant?
This webinar will provide these key takeaways:
-The current state of an official GDPR certification and codes of conduct
-Case studies of how companies are demonstrating compliance
-The benefits of an external third party GDPR validation
The national Scot-Secure Summit is the largest annual Cyber Security Conference in Scotland: the event brings together senior IT leaders and Information Security personnel, providing a unique forum for knowledge exchange, discussion and high-level networking.
The conference programme is focussed on promoting best-practice cyber security; looking at the current trends, the key threats - and offering practical advice on improving resilience and implementing effective security measures.
The results from Syncsort's annual State of the Mainframe survey are in! The importance of controlling mainframe speed and optimizing the use of processing the resources is a key focus point as reliance on the mainframe remains critical for most organizations.
View this webcast on-demand to get an in-depth look at the survey results and five trends to watch for in 2018. You'll also learn how your peers view the importance of:
• Investments in the mainframe and finding ROI
• Modernizing mainframe environments
• Meeting security and compliance requirements
• Using mainframe data from Big Data analytics
As the internet has expanded and criminals have found more ways of creating revenue from stolen information, the need for digital threat intelligence management (DTIM) has increased. Without a means of early identification, companies that are being targeted have no way of knowing their customer’s or employee’s security is threatened or that their brand is being stolen, resulting in an erosion of reputation. DTIM is the early warning system to aid those organizations in identifying the infringements and thefts before severe damage is done.
These slides--based on the webinar from leading IT analyst firm Enterprise Management Associates (EMA) and RiskIQ -- highlight why DTIM is a growing necessity for mid- and large-sized organizations.
How to Centre your PCI Programme Around your Business Objective - SureCloud SureCloud
SureCloud will explore the challenges that organisations face when achieving and maintaining compliance with PCI DSS, with a particular focus on how organisations can design and deploy a programme that aligns with wider business objectives and embeds compliance activities into business operations.
The session will be structured around our case study organisation, Bananas to help bring this use case to life.
How to determine a proper scope selection based on ISO 27001?PECB
Meeting Clause 4 - Context of the Organization "generic" requirements of ISO 27001 in order to determine a proper Documented Scope statement that meets business requirements and gives value to products and/or services.
Main points that have been covered are:
• Interested Parties
• Interfaces & Dependencies
• Legal / Regulatory & Contractual Obligations (Risk of Non-Compliance)
• Documented Scope Statement (including locations within Scope)
Presenter:
Mr. David Anders has worked more than 20+ years in the risk management field managing a broad spectrum of consulting services and product solutions. David has worked in the consulting field for 16 years and is the founder / CEO of SecuraStar, LLC, a niche ISO 27001 consulting firm in the United States and founder / CEO of ISMS Manager Software, LLC.
Link of the recorded session published on YouTube: https://youtu.be/hSaAvKgAC2c
Data Privacy: The Hidden Beast within Mergers & AcquisitionsTrustArc
Today, growing an organization through Mergers & Acquisitions (M&A) has become a popular business practice. This can lead to great success but it can also cause a potential liability to the acquirer if global data privacy laws and regulations are not considered during the acquisition. Businesses that adopt this strategy need to be aware of how to handle the data involved in the acquisitions.
Between new and evolving data privacy laws, an increased focus on regulators, and increased liability on the acquirer, incorporating data privacy practices is necessary for the M&A transaction process.
Cloud data security and GDPR complianceSalim Benadel
Slides from the joint webinar session by Salim Benadel of Storm Internet & Mark Gracey of Digital Compliance Hub on how the right data storage provider solves your business’s GDPR security and breach compliance problems.
[Webinar Slides] Privacy Shield is Here – What You Need to KnowTrustArc
To read more about Privacy Shield visit: https://www.truste.com/business-products/dpm-services/eu-privacy-shield/
To schedule a consultation to learn more about TRUSTe EU–U.S. Privacy Shield Solutions visit: https://www.truste.com/about-truste/contact-us/?id=Web-PrivacyShield-LearnMoreFloat-Form_LP_v2
Watch the full on-demand webinar recording accompanying these slides by visiting: https://info.truste.com/privacy-shield-what-you-need-to-know-webinar.html
The new Privacy Shield Framework has been formally adopted after months of rigorous EU regulatory review and the Department of Commerce is expected to start taking submissions in August. What does this mean for companies looking to comply with the new Framework?
Register NOW to watch the on-demand webinar immediately as it will:
1. Take you through the detailed changes from the previous Safe Harbor Framework
2. Explain how you can prepare for the additional requirements and scrutiny
3. Review the changes that include: new privacy policy disclosures; accountability for onward transfers; greater monitoring and regulatory enforcement; enhanced dispute resolution and detailed audit trail documentation and reporting.
Make sure to register NOW to watch the on-demand webinar at: https://info.truste.com/privacy-shield-what-you-need-to-know-webinar.html
To register for upcoming other TRUSTe Webinars (upcoming/on-demand) visit: https://www.truste.com/events/privacy-insight-webinar-schedule/
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...AIIM International
Learn actionable steps to provide a high-level plan for implementing a privacy program in conjunction with your existing organizational RIM/IG program(s).
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/data-privacy-for-the-im-practitioner-practical-advice-for-preparedness-and-prevention
Similar to Feb20 Webinar - Managing Risk and Pain of Vendor Management (20)
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc
In today's digital world, trust is key to customer relationships, but keeping it is a huge challenge. Customers are well-informed and empowered, quick to change brands if their trust is broken, even if it costs them more. This puts a lot of pressure on organizations to handle trust and safety issues with great care and transparency.
The challenge, however, is real. Fragmented solutions have left privacy, legal, and security teams in a perpetual cycle of catch-up, struggling to update privacy notices, manage customer data rights, and answer lengthy security questionnaires—all while trying to prove ROI to the business. It's a thankless job, filled with repetition, tedious tasks, and constant interdepartmental coordination. Combine this with fast regulatory changes and the quick evolution of AI, and it becomes overwhelming.
Join this webinar to learn more about TrustArc's new innovative solution Trust Center, the only unified, no-code online hub for trust and safety information built for privacy, security, compliance, and legal teams. Trust Center streamlines your path to compliance, shortens the pre-sales cycle, and reduces both legal and regulatory risks, saving time, effort, and cost.
This webinar will review:
- Why companies are building unified Trust Centers for a robust privacy program.
- How unified Trust Centers streamline sales cycles, ensure regulatory compliance, and reduce operational bottlenecks.
- How compliance, legal, security, GRC, and privacy teams benefit from a unified Trust Center in terms of needs, pains, and outcomes.
- How TrustArc Trust Center saves time and work while reducing legal, reputational, and compliance risk by effectively managing policies, notices, terms, and disclosures, and providing real-time updates on subprocessors.
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
Effective data discovery is crucial for maintaining compliance and mitigating risks in today's rapidly evolving privacy landscape. However, traditional manual approaches often struggle to keep pace with the growing volume and complexity of data.
Join us for an insightful webinar where industry leaders from TrustArc and Privya will share their expertise on leveraging AI-powered solutions to revolutionize data discovery.
You'll learn how to:
- Effortlessly maintain a comprehensive, up-to-date data inventory
- Harness code scanning insights to gain complete visibility into data flows leveraging the advantages of code scanning over DB scanning
- Simplify compliance by leveraging Privya's integration with TrustArc
- Implement proven strategies to mitigate third-party risks
Our panel of experts will discuss real-world case studies and share practical strategies for overcoming common data discovery challenges. They'll also explore the latest trends and innovations in AI-driven data management, and how these technologies can help organizations stay ahead of the curve in an ever-changing privacy landscape.
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
As privacy and data protection regulations evolve rapidly, organizations operating in multiple jurisdictions face mounting challenges to ensure compliance and safeguard customer data. With state-specific privacy laws coming up in multiple states this year, it is essential to understand what their unique data protection regulations will require clearly.
How will data privacy evolve in the US in 2024? How to stay compliant?
Our panellists will guide you through the intricacies of these states' specific data privacy laws, clarifying complex legal frameworks and compliance requirements.
This webinar will review:
- The essential aspects of each state's privacy landscape and the latest updates
- Common compliance challenges faced by organizations operating in multiple states and best practices to achieve regulatory adherence
- Valuable insights into potential changes to existing regulations and prepare your organization for the evolving landscape
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
Want to win over both existing and potential customers? Show them you value their privacy rights. And make opting in or out of targeted services and marketing a breeze. Businesses build trust by giving consumers control over their personal information. When you prioritize privacy, everyone wins!
How to accelerate the setup and management of complex cookie activities while ensuring compliance with privacy laws in all countries you operate in? How to use consumer trust as a competitive advantage?
In this webinar, you will learn:
- How to solve the challenge of identifying customers and respecting their choices across devices and browsers
- How to ensure a frictionless consent choice experience for your customers
- How to manage different and evolving cookie requirements and always stay compliant with data privacy laws
- What is Trustworthy AI and why it is important
TrustArc Webinar - How to Live in a Post Third-Party Cookie WorldTrustArc
Google announced it will phase out the use of third-party cookies on Chrome in 2024. Since Chrome has a market share of 65% of browser users, this practice will affect most businesses and cookie marketing.
As a marketer, how can you adapt to this significant change? How will you need to change your practices in the way you do business online in order to reach your target audience and drive revenue success?
In this webinar, you will learn how to prepare your organization for Google’s third-party phase-out and ensure marketing success.
This webinar will review:
- What to keep in mind about the latest cookie phase-out and what is coming
- What you need to know about the laws and regulations around cookies
- How to explore new privacy-friendly approaches to engage with your audience
TrustArc Webinar - TrustArc's Latest AI InnovationsTrustArc
There’s no question the AI wave is here to stay. Regulators, organizations and consumers are all dealing with the acceleration of AI adoption in different ways.
Regulators are rushing to create and pass standards and laws like the EU AI Act, NIST AI RMP and OECD AI Principles to guide how organizations can and should adopt transparent, accountable AI practices to protect consumer privacy. For consumers, despite acknowledgement around the increasing value of AI, 60% of consumers say they have lost trust in how AI is used by organizations. And organization are left in the middle trying to keep up with regulations, drive AI adoption in their business process and products, and maintain consumer trust.
Introducing two innovative solutions designed to help organizations navigate the shifting AI landscape:
- TRUSTe Responsible AI Certification - The first AI certification designed for data protection and privacy. Crafted by a team with 10,000+ privacy certifications issued, this framework integrated industry standards and emerging laws for responsible AI governance.
- NymityAI - Your personalized privacy legal navigator to help you learn the law faster and easier - with confidence.
Join us on this webinar to learn how to establish responsible AI governance and instill trust in your partners, consumers, and customers around AI use and privacy data protection.
This webinar will review:
- How TRUSTe’s Responsible AI Certification will help you demonstrate accountable AI data governance that is fair, transparent and secure
- How to save time and work smarter in understanding regulatory obligations, including AI
- How to operationalize and deploy AI governance best practices in your organization
Unlock the definitive guide to managing your online tracking technology vendors effectively. This webinar delves into a comprehensive and actionable set of best practices that every organization needs. From meticulous website scans to in-depth contract reviews, from precise consent categorization to harmonizing diverse frameworks, our checklist ensures you cover all the crucial touchpoints. Equip yourself with this essential framework and confidently navigate the complex landscape of online tracking compliance, using our step-by-step roadmap as your trusted reference.
Join our panel of experts in the webinar as they equip you with the knowledge and strategies for navigating vendor relationships under CPRA.
TrustArc Webinar - Privacy in Healthcare_ Ensuring Data SecurityTrustArc
In a healthcare landscape where data flows are constant, and patient trust is paramount, it’s critical to understand and implement adequate data security and privacy practices. Start navigating the importance of privacy in healthcare for 2023 and beyond. Remembering that privacy is more than just checking a box is essential.
To better understand how to measure privacy in a healthcare setting correctly, healthcare leaders must understand how to grow and maintain privacy programs effectively and have insights into their privacy methods.
Whether you are wondering what data privacy is or already know, this webinar will help you better understand the importance of privacy in protecting you and your clients.
Unlocking AI Potential: Leveraging PIA Processes for Comprehensive Impact Ass...TrustArc
Artificial Intelligence (AI) has emerged as a transformative force in various industries, from healthcare to finance and beyond. While AI offers incredible opportunities, it also raises ethical, legal, and social challenges that must be addressed. To navigate this complex landscape in the world of privacy, it is crucial to conduct comprehensive Privacy Impact Assessments (PIAs).
Conducting PIAs in this dynamic and evolving world of AI has brought new challenges to the privacy world. With AI increasingly being integrated into different areas of our lives, understanding the intersection between AI and PIAs is essential for any organization to ensure they are privacy forward.
Take advantage of this opportunity to gain a comprehensive understanding of AI impact assessments and their role in shaping the future of AI. In this insightful webinar, our experts will explore the power of Privacy Impact Assessments (PIAs) in ensuring responsible AI development and deployment.
In this webinar, some key topics that will be covered include:
- Introduction to AI PIAs
- PIAs demystified (why they are essential in the context of AI)
- Explore the evolving legal and regulatory landscape governing AI and privacy, including GDPR, CCPA, and other international standards
- Best practices for conducting effective PIAs in AI projects
- Future outlooks for AI and PIAs
Mitigating Third-Party Risks: Best Practices for CISOs in Ensuring Robust Sec...TrustArc
Organizations rely heavily on third-party vendors and partners to enhance operational efficiency and deliver innovative solutions in today's interconnected digital landscape. However, this increased reliance on third parties also introduces a complex web of security and privacy risks that can have far-reaching consequences for organizations' data, reputation, and compliance.
Join us for an insightful and informative webinar as we delve into mitigating third-party risks. This webinar will provide essential strategies and best practices to ensure robust security and privacy measures when collaborating with external entities.
Nymity Framework: Privacy & Data Protection Update in 7 StatesTrustArc
As privacy and data protection regulations evolve rapidly, organizations opera
ting in multiple jurisdictions face mounting challenges to ensure compliance and safeguard customer data. With state-specific privacy laws coming up in Iowa, Indiana, Montana, Tennessee, Texas, Florida, and Oregon, it is essential to understand what their unique data protection regulations will require clearly.
Discover how to stay compliant and safeguard customer data as our panelists decode state-specific privacy laws, share best practices, and discuss data security risk management. Prepare your organization for the future with insights into emerging trends.
Our panelists will guide you through the intricacies of these states' specific data privacy laws, clarifying complex legal frameworks and compliance requirements.
CBPR - Navigating Cross-Border Data Privacy ComplianceTrustArc
Just over a year ago, on 21 April 2022, seven economies, including Canada, Japan, the Republic of Korea, the Philippines, Singapore, Taiwan, and the USA, announced the launch of the Global CBPR Forum. Since then, Australia and Mexico have joined the Forum, marking a significant stride towards a global approach to data privacy cooperation.
In this highly anticipated webinar, we explore the background, the future direction, and assess the potential business case for companies considering certification under the new Global CBPR System. As an Associate Member of the Forum, the UK has demonstrated a keen interest in joining this innovative system, making it the first country outside the APEC region to express such intent.
Everything You Need to Know about DPF But Are Afraid to Ask.pdfTrustArc
Hooray! The long-awaited EU-U.S. and Swiss-U.S. Data Privacy Frameworks are officially adequate! Now what?
Well, now the real work begins for companies who want to join (or re-join!) into one of the premier international privacy standards. As the White House shared, transatlantic data flows are critical to enabling the $7.1 trillion EU-U.S. economic relationship. With the EU-US Data Privacy Framework in effect, businesses will have the ability to transfer personal data from the EU to the U.S. in compliance with GDPR and EU law.
Join our panel of experts for an interactive discussion about all things DPF. Be sure to bring your questions to the session because we will be ready to answer them!
We'll answer these questions and more:
- Why is the EU-US DPF important to the international community and businesses?
- What are the benefits of DPF verification?
- How do I get started with DPF?
- How can I get verified or certified quickly?
Your Guide to Understanding the Global Privacy Control (GPC): Preparing for C...TrustArc
Back in 2020, GPC was introduced in the CCPA as a way to help keep consumer information safe by allowing users to opt-out with a single click rather than manually selecting each opt-out. However, the recent CCPA regulations create greater obligations for certain companies, specifically those that can identify known users and those that provide loyalty programs. Being unprepared for the new Global Privacy Control (GPC) obligations under the CPRA can open your company to risk.
Prepare your business for compliance with GPC and other browser signals.
Join the TrustArc privacy experts to learn:
- What is GPC & why is it important
- How does GPC impact your business and your customers under the new CCPA regulations?
- How to operationalize GPC requirements using software for your business
Privacy Enhancing Technologies: Exploring the Benefits and RecommendationsTrustArc
Privacy Enhancing Technologies (PETs) comprise a range of tools that mitigate the risks associated with the collection of data. These technologies offer various functionalities, which help uphold data governance choices, foster data collaboration, and enhance accountability.
As privacy regulations continue to evolve, organizations are increasingly turning to Privacy Enhancing Technologies (PETs) to protect personal data while enabling data-driven business decisions. In this webinar, we will explore the benefits of PETs, how they are used, and why they are critical for enhancing privacy.
Building Trust and Competitive Advantage: The Value of Privacy CertificationsTrustArc
As privacy concerns continue to grow, businesses are under increased pressure to demonstrate their commitment to protecting personal data. Privacy certifications are emerging as a way for organizations to demonstrate they are taking privacy seriously and following best practices.
Whether you are a small business or a large corporation, understanding the value of privacy certifications and how they can help you demonstrate your commitment to protecting personal data is important.
Learn the importance of how privacy certifications can unlock business value and help you stay ahead of the competition in today's privacy-conscious landscape.
The California Age Appropriate Design Code Act Navigating the New Requirement...TrustArc
The California Age-Appropriate Design Code Act (CAADCA) was signed into law by Governor Gavin Newsom in September 2022. Starting on July 1, 2024, the bill will mandate businesses providing online services or features that are "likely to be accessed by children" take certain measures, such as conducting a data protection impact assessment.
In this webinar, experts explore the intersection between CAADCA and existing children's privacy laws, and provide guidance on how companies, especially those in the gaming and child data handling app industries, can achieve compliance well in advance of the effective date.
2023 Global Privacy Benchmarks Survey - Webinar May 30 2023.pdfTrustArc
Discover how organizational priorities and strategic approaches to data security and privacy are developing across the globe. Gain a deeper understanding of how your organization's privacy program compares to those of your peers and learn about the emerging trends that will shape the future of privacy.
Hear insights from more than 1,500 global privacy professionals and business executives. Our 4th Annual Global Privacy Benchmarks Survey presents a comprehensive analysis of the progress made by privacy programs in the past year, the expansion of privacy teams, and the most pressing privacy challenges faced by organizations.
Artificial Intelligence Bill of Rights: Impacts on AI GovernanceTrustArc
Artificial Intelligence (AI) is increasingly being used to make decisions that impact individuals and society as a whole. As the use of AI continues to grow, there is a need to establish guidelines and regulations to ensure that it is being used responsibly and ethically.
In October 2022, the White House Office of Science and Technology Policy (OSTP) published a Blueprint for an AI Bill of Rights (“Blueprint”), which shared a nonbinding roadmap for the responsible use of artificial intelligence (AI). In this webinar, we will examine the key principles that underpin the bill, such as transparency, accountability, and fairness, and discuss how they can help ensure that the use of AI aligns with the values and rights of individuals.
How To Do Data Transfers Between EU-US in 2023TrustArc
Since March 2022, businesses in the EU and U.S. have been waiting for an adequacy decision on the revamped Privacy Shield data transfer agreement, the U.S.-EU Data Transfer Framework Executive Order. The agreement would allow Europeans’ data to flow to the U.S. once again, after a long two years since Schrems II overturned Privacy Shield.
Yet the European Data Protection Board (EDPB) and European Parliament announced that the U.S.-EU Data Transfer Framework Executive Order is insufficient and does not provide adequate safeguards in March 2023.
What does this mean for businesses that have been in cross-border data transfer limbo since Schrems II? Is it possible to do data transfers between the EU and the US?
This webinar reviews:
- Where does the EU-U.S. Data Transfer Framework stand today?
- What adequate safeguards are currently missing from the framework in the eyes of the EDPB and European Parliament?
- How SCCs can be used for cross-border data transfers
- Risk mitigation for international data transfers
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/