SlideShare a Scribd company logo
Atle	Skjekkeland,	SVP,	AIIM	
@skjekkeland	
askjekkeland@aiim.org	
GDPR	
How	to	Ensure	Compliance?
Era	
Years	
Typical	
thing	
managed	
Best	
known	
company	
Content	
mgmt	
focus	
Mainframe	
1960-1975	
A	batch	
transacMon	
IBM	
Microfilm	
Mini	
1975-1992	
A	dept	
process	
Digital	
Equipment	
Image	
Mgmt	
PC	
1992-2001	
A	
document	
MicrosoR	
Document	
Mgmt	
Internet	
2001-2009	
A	web	
page	
Google	
Content	
Mgmt	
Cloud,	Mobile,	
ConsumerizaMon,	
Internet	of	Things	
2010-2018	
An	
interacMon	
Facebook	
Digital	
Business	
Systems	of	Record	
Systems	of	Engagement
In	your	organizaMon,	has	non-compliance	with	good	InformaMon	Governance	pracMce	created	a	
significant	issue	with	any	of	the	following	in	the	last	2	years?		
N=334	
0%	 5%	 10%	 15%	 20%	 25%	 30%	
Internal	audits	(regulatory,	financial,	HR)	
InformaMon	Requests	(FoI,	FOIA,	Personal	data)	
Data	protecMon	compliance	and	privacy	issues	
LiMgaMon	and	discovery	
Incident	response,	business	conMnuity	
External	audits	(industry,	government)	
HR	issues	and	staff	disputes	
Regulatory	submissions	
Compliance	with	anM-compeMMon,	money	
None	of	these	
Compliance	Risks
•  The	General	Data	Protec9on	Regula9on	(GDPR)	(RegulaMon	(EU)	2016/679)	is	
a	regulaMon	by	which	the	European	Parliament,	the	European	Council	and	
the	European	Commission	intend	to	strengthen	and	unify	data	protecMon	for	all	
individuals	within	the	European	Union	(EU).		
•  It	also	addresses	the	export	of	personal	data	outside	the	EU.		
•  The	primary	objecMves	of	the	GDPR	are	to	give	ciMzens	and	residents	back	control	
of	their	personal	data	and	to	simplify	the	regulatory	environment	for	
interna9onal	business	by	unifying	the	regula9on	within	the	EU.	
•  When	the	GDPR	takes	effect	it	will	replace	the	data	protecMon	direcMve	(officially	
DirecMve	95/46/EC)	from	1995.		
•  GDPR	applies	from	25	May	2018	aRer	a	two-year	transiMon	period	and,	unlike	
a	direcMve,	it	does	not	require	any	enabling	legislaMon	to	be	passed	by	naMonal	
governments.	
General	Data	Protec9on	Regula9on
•  The	regulaMon	applies	if	the	data	
controller	(organisa9on	that	collects	
data	from	EU	residents)	or	processor	
(organisa9on	that	processes	data	on	
behalf	of	data	controller	e.g.	cloud	
service	providers)	or	the	data	subject	
(person)	is	based	in	the	EU.	
•  Furthermore	the	RegulaMon	also	
applies	to	organisa9ons	based	
outside	the	European	Union	if	they	
collect	or	process	personal	data	of	
EU	residents.	
Who	Is	It	For?
According	to	the	European	Commission:		
•  “Personal	data	is	any	informaMon	relaMng	
to	an	individual,	whether	it	relates	to	his	
or	her	private,	professional	or	public	life.”		
•  “It	can	be	anything	from	a	name,	a	
home	address,	a	photo,	an	
email	address,	bank	details,	
posts	on	social	networking	
websites,	medical	informa9on,	
or	a	computer’s	IP	address.”	
What	Type	of	Informa9on	
Unstructured	content	is	really	
important	in	relaMon	with	GDPR.
•  A	warning	in	wriMng	in	cases	of	first	and	non-intenMonal	
non-compliance.	
•  Regular	periodic	data	protecMon	audits.	
•  A	fine	up	to	10,000,000	EUR	or	up	to	2%	of	the	annual	
worldwide	turnover	of	the	preceding	financial	year	in	
case	of	an	enterprise,	whichever	is	greater	(ArMcle	83,	
Paragraph	4)).	
•  A	fine	up	to	20,000,000	EUR	or	up	to	4%	of	the	annual	
worldwide	turnover	of	the	preceding	financial	year	in	
case	of	an	enterprise,	whichever	is	greater	(ArMcle	83,	
Paragraph	5	&	6).	
Sanc9ons
(a)	processed	lawfully,	fairly	and	in	a	transparent	manner	in	relaMon	to	the	data	subject	(‘lawfulness,	
fairness	and	transparency’);	
(b)	collected	for	specified,	explicit	and	legiMmate	purposes	and	not	further	processed	in	a	manner	that	
is	incompaMble	with	those	purposes… (‘purpose	limita9on’);	
(c)	adequate,	relevant	and	limited	to	what	is	necessary	in	relaMon	to	the	purposes	for	which	they	are	
processed	(‘data	minimisa9on’);	
(d)	accurate	and,	where	necessary,	kept	up	to	date;	every	reasonable	step	must	be	taken	to	ensure	that	
personal	data	that	are	inaccurate,	having	regard	to	the	purposes	for	which	they	are	processed,	are	
erased	or	recMfied	without	delay	(‘accuracy’);	
(e)	kept	in	a	form	which	permits	idenMficaMon	of	data	subjects	for	no	longer	than	is	necessary	for	the	
purposes	for	which	the	personal	data	are	processed….	(‘storage	limita9on’);	
(f)	processed	in	a	manner	that	ensures	appropriate	security	of	the	personal	data,	including	protecMon	
against	unauthorised	or	unlawful	processing	and	against	accidental	loss,	destrucMon	or	damage,	using	
appropriate	technical	or	organisaMonal	measures	(‘integrity	and	confiden9ality’).	
Personal	Data	Shall	Be…
•  In	order	to	be	able	to	demonstrate	compliance	with	the	GDPR,	the	data	controller	
should	implement	measures	which	meet	the	principles	of	data	protec9on	by	design	
and	data	protec9on	by	default.		
•  Privacy	by	Design	and	by	Default	(ArMcle	25)	require	that	data	protecMon	measures	
are	designed	into	the	development	of	business	processes	for	products	and	services.		
•  It	is	the	responsibility	and	liability	of	the	data	controller	to	implement	effec9ve	
measures	and	be	able	to	demonstrate	the	compliance	of	processing	ac9vi9es	
even	if	the	processing	is	carried	out	by	a	data	processor	on	behalf	of	the	
controller.	(Recital	74).	
•  Data	ProtecMon	Impact	Assessments	(ArMcle	35)	have	to	be	conducted	when	
specific	risks	occur	to	the	rights	and	freedoms	of	data	subjects.	
Responsibili9es
•  Privacy	by	Design	and	by	Default	(ArMcle	25)	requires	
that	data	protecMon	is	designed	into	the	development	
of	business	processes	for	products	and	services.		
•  This	requires	that	privacy	seqngs	must	be	set	at	a	
high	level	by	default,	and	that	technical	and	
procedural	measures	should	be	taken	care	by	the	
controller	in	order	to	make	sure	that	the	processing,	
throughout	the	whole	processing	lifecycle,	complies	
with	the	regulaMon.	
•  Controllers	should	also	implement	mechanisms	to	
ensure	that	personal	data	is	only	processed	when	
necessary	for	each	specific	purpose.	
Privacy	by	Design	and	by	Default
•  Valid	consent	must	be	explicit	for	
data	collected	and	the	purposes	
data	is	used	for	(ArMcle	7;	defined	
in	ArMcle	4).		
•  Consent	for	children	must	be	given	
by	the	child’s	parent	or	custodian,	
and	verifiable	(ArMcle	8).		
•  Data	controllers	must	be	able	to	
prove	"consent"	(opt-in)	and	
consent	may	be	withdrawn.	
	Consent
•  The	GDPR	refers	to	pseudonymisaMon	as	a	process	that	transforms	personal	data	in	
such	a	way	that	the	resulMng	data	cannot	be	asributed	to	a	specific	data	subject	
without	the	use	of	addiMonal	informaMon.		
–  An	example	of	pseudonymisaMon	is	encrypMon,	which	renders	the	original	data	unintelligible	and	
the	process	cannot	be	reversed	without	access	to	the	right	decrypMon	key.		
–  The	GDPR	requires	that	this	addiMonal	informaMon	(such	as	the	decrypMon	key)	be	kept	
separately	from	the	pseudonymised	data.		
–  PseudonymisaMon	is	recommended	to	reduce	the	risks	to	the	concerned	data	subjects	and	also	
help	controllers	and	processors	to	meet	their	data-protecMon	obligaMons	(Recital	28).	
–  If	the	personal	data	is	pseudonymised	with	adequate	internal	policies	and	measures	by	the	data	
controller,	then	it	is	considered	to	be	effecMvely	anonymized,	and	not	subject	to	controls	and	
penalMes	of	the	GDPR.		
–  The	policies	and	measures	that	meet	the	principles	of	data	protecMon	by	design	and	data	
protecMon	by	default	should	be	considered	adequate	for	this	purpose.		
–  Example	measures	would	include	pseudonymizing	the	data	as	soon	as	possible	(Recital	78),	
encrypMng	the	data	locally,	keeping	the	decrypMon	keys	separately	from	the	encrypted	data.	
Pseudonymisa9on
•  ArMcle	17	provides	that	the	data	
subject	has	the	right	to	request	
erasure	of	personal	data	related	to	
them	on	any	one	of	a	number	of	
grounds	including	non-compliance	
with	arMcle	6.1	(lawfulness)	that	
includes	a	case	(f)	where	the	
legiMmate	interests	of	the	
controller	is	overridden	by	the	
interests	or	fundamental	rights	and	
freedoms	of	the	data	subject	which	
require	protecMon	of	personal	data	
Right	to	Erasure
•  A	person	shall	be	able	to	
transfer	their	personal	data	
from	one	electronic	
processing	system	to	and	
into	another,	without	being	
prevented	from	doing	so	by	
the	data	controller.		
•  In	addiMon,	the	data	must	be	
provided	by	the	controller	in	
a	structured	and	commonly	
used	electronic	format.		
•  The	right	to	data	portability	
is	provided	by	ArMcle	20	of	
the	GDPR.		
Data	Portability
•  Under	the	GDPR,	the	Data	Controller	will	be	under	a	legal	obligaMon	to	noMfy	the	
Supervisory	Authority	without	undue	delay.		
•  The	data	breach	must	be	reported	to	the	Supervisory	Authority	within	72	hours	of	
the	data	breach	(ArMcle	33).		
•  Individuals	have	to	be	noMfied	if	adverse	impact	is	determined	(ArMcle	34).		
•  However,	the	data	processor	or	controller	do	not	have	to	noMfy	the	data	subjects	if	
anonymized	data	is	breached.		
•  Specifically,		the	noMce	to	data	subjects	is	not	required	if	the	data	controller	has	
implemented	pseudonymisaMon	techniques	like	encrypMon	along	with	adequate	
technical	and	organizaMonal	protecMon	measures	to	the	personal	data	affected	by	
the	data	breach	(ArMcle	34).	
Data	Breaches
1.  IdenMfy	use	of	personal	data	and	content	to	ensure	lawfulness,	fairness	and	
transparency	
2.  Limit	purpose	and	data	minimiza9on	by	only	collecMng	informaMon	for	specified,	
explicit	and	legiMmate	purposes		
3.  Connect	data	and	content	to	get	a	unified	view	for	beser	control,	portability,	and	
deleMon	
4.  Use	metadata	to	ensure	privacy-by-design	and	by	default	compliance	
5.  Apply	retenMon	management	to	limit	storage	
6.  Use	encrypMon	at	transit	and	at	rest	to	ensure	integrity	and	confiden9ality	
7.  Use	access	control	lists,	permission	management,	and	audit	trails	to	ensure	
compliance	
7	Steps	to	GDPR	Compliance
1.	Prevent	
• 	Risk	assessments	
• 	Training	
• 	Policies	&	procedures	
• 	ExecuMve	commitment	
• 	Systems	
2.	Detect	
• 	Data	ProtecMon	Officer	
• 	Audit	
• 	Monitoring	
3.	Respond	
• 	ReporMng	
• 	InvesMgaMon	
• 	CommunicaMon		
• 	Improvements	
• 	Employee	discipline	
Prevent	
Detect	Respond	
Establish	a	Compliance	Framework
Establish	Privacy	by	Design/Default	
CRM	 ERP	 Email	
Share	
Point	
CMS	 Shared	
drives	
LOB	
apps	
Metadata	
Inbound	logisMcs	 ProducMon	
Outbound	
logisMcs	
MarkeMng	
&	Sales	
Service	&	
Support	
Metadata	
extracMon	
and	
metadata	
management	
is	key	for	
managing	
unstructured	
content	in	
relaMon	with	
GDPR.
“OrganizaMonal	
culture	eats	strategy	
for	breakfast,	lunch	
and	dinner”	– Peter	
Drucker.			
Keep	IT	Simple	and	Smart	
New	IT:	 	Old	IT:

More Related Content

What's hot

Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
Priyab Satoshi
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)
Acquia
 
GDPR 2.0 - Data Controllers v Processors
GDPR 2.0 - Data Controllers v ProcessorsGDPR 2.0 - Data Controllers v Processors
GDPR 2.0 - Data Controllers v Processors
Adam Wood
 
GDPR Overview
GDPR OverviewGDPR Overview
GDPR Overview
Trish McGinity, CCSK
 
GDPR
GDPRGDPR
GDPR
Gopi PD
 
Practical steps to GDPR compliance
Practical steps to GDPR compliance Practical steps to GDPR compliance
Practical steps to GDPR compliance
Jean-Michel Franco
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
Eryk Budi Pratama
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
Amiit Keshav Naik
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
Extentia Information Technology
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
DipanjanDey12
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
PECB
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
BCC - Solutions for IBM Collaboration Software
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program Management
Eryk Budi Pratama
 
GDPR for Dummies
GDPR for DummiesGDPR for Dummies
GDPR for Dummies
Caroline Boscher
 
2019 04-17 10 steps to ccpa compliance
2019 04-17 10 steps to ccpa compliance2019 04-17 10 steps to ccpa compliance
2019 04-17 10 steps to ccpa compliance
TrustArc
 
International Data Transfer Update
International Data Transfer UpdateInternational Data Transfer Update
International Data Transfer Update
TrustArc
 
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?
IT Governance Ltd
 
GDPR
GDPRGDPR
Cloud and Data Privacy
Cloud and Data PrivacyCloud and Data Privacy
Cloud and Data Privacy
Maganathin Veeraragaloo
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in India
Home
 

What's hot (20)

Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)Understanding the EU's new General Data Protection Regulation (GDPR)
Understanding the EU's new General Data Protection Regulation (GDPR)
 
GDPR 2.0 - Data Controllers v Processors
GDPR 2.0 - Data Controllers v ProcessorsGDPR 2.0 - Data Controllers v Processors
GDPR 2.0 - Data Controllers v Processors
 
GDPR Overview
GDPR OverviewGDPR Overview
GDPR Overview
 
GDPR
GDPRGDPR
GDPR
 
Practical steps to GDPR compliance
Practical steps to GDPR compliance Practical steps to GDPR compliance
Practical steps to GDPR compliance
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
Overview on data privacy
Overview on data privacy Overview on data privacy
Overview on data privacy
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
Presentation on GDPR
Presentation on GDPRPresentation on GDPR
Presentation on GDPR
 
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
CIA Triad in Data Governance, Information Security, and Privacy: Its Role and...
 
General Data Protection Regulation
General Data Protection RegulationGeneral Data Protection Regulation
General Data Protection Regulation
 
Common Practice in Data Privacy Program Management
Common Practice in Data Privacy Program ManagementCommon Practice in Data Privacy Program Management
Common Practice in Data Privacy Program Management
 
GDPR for Dummies
GDPR for DummiesGDPR for Dummies
GDPR for Dummies
 
2019 04-17 10 steps to ccpa compliance
2019 04-17 10 steps to ccpa compliance2019 04-17 10 steps to ccpa compliance
2019 04-17 10 steps to ccpa compliance
 
International Data Transfer Update
International Data Transfer UpdateInternational Data Transfer Update
International Data Transfer Update
 
Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?Accountability under the GDPR: What does it mean for Boards & Senior Management?
Accountability under the GDPR: What does it mean for Boards & Senior Management?
 
GDPR
GDPRGDPR
GDPR
 
Cloud and Data Privacy
Cloud and Data PrivacyCloud and Data Privacy
Cloud and Data Privacy
 
Data Protection in India
Data Protection in IndiaData Protection in India
Data Protection in India
 

Similar to [Presentation] GDPR - How to Ensure Compliance

ACC 626 Slidecast
ACC 626 SlidecastACC 626 Slidecast
ACC 626 Slidecast
Kieng Iv
 
Thinking about Technology, Risk, and Change Management Through a Social Lens
Thinking about Technology, Risk, and Change Management Through a Social LensThinking about Technology, Risk, and Change Management Through a Social Lens
Thinking about Technology, Risk, and Change Management Through a Social Lens
John Mancini
 
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business PeopleDSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
Andris Soroka
 
IT Disaster Recovery & Business Continuity
IT Disaster Recovery & Business ContinuityIT Disaster Recovery & Business Continuity
IT Disaster Recovery & Business Continuity
mascot4u
 
IBM Big Data Views for corporate & Startups
IBM Big Data  Views for corporate & StartupsIBM Big Data  Views for corporate & Startups
IBM Big Data Views for corporate & Startups
Marco Laucelli
 
UNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITYUNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITY
ForgeRock
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
IBM Security
 
Financial Impact of BYOD Programs
Financial Impact of BYOD ProgramsFinancial Impact of BYOD Programs
Financial Impact of BYOD Programs
Bitzer Mobile, now part of Oracle
 
ICIS '97 The e-Business of e-Commerce - Question #2
ICIS '97 The e-Business of e-Commerce - Question #2ICIS '97 The e-Business of e-Commerce - Question #2
ICIS '97 The e-Business of e-Commerce - Question #2
Frank Braski
 
The Law Of Unintended Consequences
The Law Of Unintended ConsequencesThe Law Of Unintended Consequences
The Law Of Unintended ConsequencesCorporate Oasis Inc.
 
The Law Of Unintended Consequences
The Law Of Unintended ConsequencesThe Law Of Unintended Consequences
The Law Of Unintended Consequencesprobinson99
 
Steve Mills Senior Vice President and Group Executive IBM Software and Systems
Steve Mills Senior Vice President and Group Executive IBM Software and SystemsSteve Mills Senior Vice President and Group Executive IBM Software and Systems
Steve Mills Senior Vice President and Group Executive IBM Software and Systems
IBM India Smarter Computing
 
Maximize Your MarTech Stack
Maximize Your MarTech StackMaximize Your MarTech Stack
Maximize Your MarTech Stack
Ron Corbisier
 
Unifying IT for Digital War Room Performance
Unifying IT for Digital War Room PerformanceUnifying IT for Digital War Room Performance
Unifying IT for Digital War Room Performance
Enterprise Management Associates
 
Building the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your CompanyBuilding the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your Company
AIIM International
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?
John Mancini
 
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...Assespro Nacional
 
Info360 Keynote by AIIM President John Mancini
Info360 Keynote by AIIM President John ManciniInfo360 Keynote by AIIM President John Mancini
Info360 Keynote by AIIM President John Mancini
John Mancini
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Enterprise Management Associates
 

Similar to [Presentation] GDPR - How to Ensure Compliance (20)

ACC 626 Slidecast
ACC 626 SlidecastACC 626 Slidecast
ACC 626 Slidecast
 
Thinking about Technology, Risk, and Change Management Through a Social Lens
Thinking about Technology, Risk, and Change Management Through a Social LensThinking about Technology, Risk, and Change Management Through a Social Lens
Thinking about Technology, Risk, and Change Management Through a Social Lens
 
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business PeopleDSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
 
IT Disaster Recovery & Business Continuity
IT Disaster Recovery & Business ContinuityIT Disaster Recovery & Business Continuity
IT Disaster Recovery & Business Continuity
 
IBM Big Data Views for corporate & Startups
IBM Big Data  Views for corporate & StartupsIBM Big Data  Views for corporate & Startups
IBM Big Data Views for corporate & Startups
 
UNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITYUNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITY
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
Financial Impact of BYOD Programs
Financial Impact of BYOD ProgramsFinancial Impact of BYOD Programs
Financial Impact of BYOD Programs
 
ICIS '97 The e-Business of e-Commerce - Question #2
ICIS '97 The e-Business of e-Commerce - Question #2ICIS '97 The e-Business of e-Commerce - Question #2
ICIS '97 The e-Business of e-Commerce - Question #2
 
The Law Of Unintended Consequences
The Law Of Unintended ConsequencesThe Law Of Unintended Consequences
The Law Of Unintended Consequences
 
The Law Of Unintended Consequences
The Law Of Unintended ConsequencesThe Law Of Unintended Consequences
The Law Of Unintended Consequences
 
Steve Mills Senior Vice President and Group Executive IBM Software and Systems
Steve Mills Senior Vice President and Group Executive IBM Software and SystemsSteve Mills Senior Vice President and Group Executive IBM Software and Systems
Steve Mills Senior Vice President and Group Executive IBM Software and Systems
 
Maximize Your MarTech Stack
Maximize Your MarTech StackMaximize Your MarTech Stack
Maximize Your MarTech Stack
 
Unifying IT for Digital War Room Performance
Unifying IT for Digital War Room PerformanceUnifying IT for Digital War Room Performance
Unifying IT for Digital War Room Performance
 
Building the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your CompanyBuilding the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your Company
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?
 
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
 
Info360 Keynote by AIIM President John Mancini
Info360 Keynote by AIIM President John ManciniInfo360 Keynote by AIIM President John Mancini
Info360 Keynote by AIIM President John Mancini
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 

More from AIIM International

2022 IIM Infographic.pptx
2022 IIM Infographic.pptx2022 IIM Infographic.pptx
2022 IIM Infographic.pptx
AIIM International
 
Create, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational ValueCreate, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational Value
AIIM International
 
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
AIIM International
 
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
AIIM International
 
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
AIIM International
 
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
AIIM International
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
AIIM International
 
[Webinar Slides] New Approaches to Classification and Retention for Organizat...
[Webinar Slides] New Approaches to Classification and Retention for Organizat...[Webinar Slides] New Approaches to Classification and Retention for Organizat...
[Webinar Slides] New Approaches to Classification and Retention for Organizat...
AIIM International
 
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
AIIM International
 
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
AIIM International
 
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
AIIM International
 
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
AIIM International
 
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
AIIM International
 
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
AIIM International
 
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
AIIM International
 
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
AIIM International
 
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
AIIM International
 
[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern Solutions[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern Solutions
AIIM International
 
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
AIIM International
 
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
AIIM International
 

More from AIIM International (20)

2022 IIM Infographic.pptx
2022 IIM Infographic.pptx2022 IIM Infographic.pptx
2022 IIM Infographic.pptx
 
Create, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational ValueCreate, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational Value
 
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
 
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
 
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
 
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
 
[Webinar Slides] New Approaches to Classification and Retention for Organizat...
[Webinar Slides] New Approaches to Classification and Retention for Organizat...[Webinar Slides] New Approaches to Classification and Retention for Organizat...
[Webinar Slides] New Approaches to Classification and Retention for Organizat...
 
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
 
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
 
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
 
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
 
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
 
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
 
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
 
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
 
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
 
[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern Solutions[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern Solutions
 
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
 
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
 

Recently uploaded

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

[Presentation] GDPR - How to Ensure Compliance