Learn how to meet new disclosure requirements effectively with a comprehensive program of sensitive data governance.
1. A review of three disclosures (material cybersecurity incidents, process, and board oversight).
2. Reality of what this means to cybersecurity risk management programs.
3. What actions to take now to avoid headaches later.
Learn how the collaborative effectiveness of Data Discovery & Data Protection Investments can mitigate the consequences of non-compliance.
1. How do companies rate their ability to locate and protect data?
2. How do companies rate the effectiveness of their Data Protection Investments (specifically their DAG solution).
3. Comparison of data breach experience between DAG solutions and ad hoc approaches.
Attendees are eligible to receive 1 CPE credit.
Generously supported by:
Questions? Have an idea for a topic? Interested in sponsoring our web programs?