How Secure and Private is Your Data?

Logo
Presented by

Steve Yates FBCI, CBCP, FICPEM, MEPS, Director | Acertia Limited

About this talk

If you have managed to evade a data breach or fines from the regulator, then well done! Today, business and government organizations inform the public of a data breach, whereas in the past they kept quiet to avoid reputational damage until the news eventually got out! Based on recent events, either caused internally or externally by threat actors like staff, individuals, hackers, organized crime or state governments, protection of your data and its privacy has become quite challenging. This webinar will focus on data protection and the consequences of non-compliance. One example of this is Uber fined $324 million for personal data transfer. It will also cover unauthorized access through third-party suppliers and contractors), as well as tips to evaluate your data policy. Tune into this session presented by business continuity, disaster recovery, cyber resilience and major incident expert Steve Yates, as he shares his views on protecting data security and privacy. Yates will explore these elements from the attacker’s point of view and take attendees on a learning path to consider their own state of readiness for data breaches and disclosure of personal, corporate, and government information. By the end of the session, you will be able to: • Know the importance of understanding your organizations end-to-end data world, specifically mapping data sources and where it resides. • Understand how easy it could be to cause disruption, modification, or destruction of critical data along with the services which they support. • Understand the core organizational components necessary for regulation and compliance of your data resources.
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (605)
Subscribers (204300)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.