REGISTER

April2418

When:    August 28 | 2018       Attend

Achieving and maintaining GDPR compliance is a complex and expensive initiative for companies of all sizes, across all geographies and industries, and tech giants have already been sued for violating the terms, while major newspapers have been forced to restrict EU access to their websites for fear of noncompliance.

April2418

Recorded:    April 24 | 2018       Attend

The GDPR is the most significant change in data privacy regulation in more than 20 years. It comes into force on 25 May 2018 and will impact all businesses that process personal data or businesses that process personal data of EU citizens even if they are not in the EU. Obligations for compliance will affect both controller and processors and regulators will get increased enforcement powers and the right to impose fines of up to 4% of global turnover for both data breaches and infringements of the law.

dec1217tn

Recorded:    December 12 | 2017       Attend

The new EU General Data Protection Regulation (GDPR) rule looms and will take affect in May 2018, but only a third of companies are on track to be compliant by the due date. GDPR is the most significant change in data privacy regulation in more than 20 years. It represents an extraordinary shift in the way businesses will be expected to operate when they gather, process, maintain, and protect customer data. Any organization that retains information of EU citizens must be in compliance or face huge fines of up to 4% of worldwide turnover.

82917tn

When:    August 29 | 2017       Attend

Over 90% of the world’s data has been generated in the last few years. Accompanying this rapid growth in data comes exponential risks, as witnessed by the spike in cyber attacks of which no organization seems immune. The financial rewards gained by the perpetuators of cyber attacks is blatant, and this is driving continued attacks on companies containing massive amounts of consumer data. For these companies securing data is only half the battle. The risks can be greater when data is transmitted externally, hence it is critical that organizations know where sensitive data is going, how it is being transmitted, and how it is being handled and stored.

Aug9TN

Recorded:    August 9 | 2016       Attend

The Internet of Things (IoT) is here to stay, and Gartner predicts there will be over 26 billion connected devices by 2020. This is driving an explosion of data which offers tremendous opportunity for organizations to gain business value, and Hadoop has emerged as the key component to make sense of the data and realize the maximum value. On the flip side, the surge of new devices has increased the potential for hackers to wreak havoc, and Hadoop has been described as the biggest cybercrime bait ever created.

Live Webcast!

Recorded:    September 15 | 2015     

Inadequate security and dedicated cyber attackers have led enterprise data breaches to increase at an alarming pace. Staggering numbers of affected customers - and financial losses - are sending shock waves through the business world, and creating a sense of urgency around identifying solutions. Finding a way to ward off cyber intruders has become a critical challenge.

Live Webinar

Recorded:   January 21 | 2015      Play

In 2015 the size of the digital universe will be tenfold what it was in 2010. Large-scale data breaches are on the rise across all sectors, and enterprise data security initiatives must evolve to address new and growing threats. Consumer transactions, personally identifiable information, customer records, and the like, all flowing together into the Hadoop 'data lake', will enable critical business insights but also means Hadoop installations will be a rich target for cyber-crime.

Live Webcast!

Recorded:   October 1 | 2014       Play

If you're embarking on Hadoop adoption you know that sensitive customer and corporate data will be in the ecosystem – transactional data, intellectual property, customer files, and more. As Adrian Lane of Securosis has noted, "High quality data produces better analysis results—which is why a key ingredient is sensitive data." Now the question becomes how to keep sensitive data secure as it moves into and beyond Hadoop, and—most importantly—how to protect the data but still make it accessible by many different users with varying analytic needs and ad-hoc processes.

Log in

Please Login to download this file

Username *
Password *
Remember Me

Create an account

Fields marked with an asterisk (*) are required.
Name *
Username *
Password *
Verify password *
Email *
Verify email *
Captcha *

MetricStream TPRM

Banner

CyberBanner

CyberBanner

CyberBanner

MetricStream TPRM

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

CyberBanner

Go to top