A Practical Approach to GDPR Requirements

At the time of this webinar, many enterprises are/were finalizing their plans for addressing new requirements of the GDPR directive. GDPR has both a business and a technical impact, which is particularly challenging when the enforcement regime is so unclear at this point in time.

GDPR webinar

In this webinar, experts from EY and Axiomatics discuss the following topics in an effort to provide practical guidance to enterprises that fall under the purview of this new directive:

-What data is covered by GDPR?
-Privacy by design is paramount
-Data protection processes must be defined and documented
-Evidence of consent management and enforcement
-Developing a reference architecture for Data Subject Rights

Hosted by:

Atul Ojha, EY Manager of National Advisory, Cybersecurity
Måns Håkansson, Solutions Architect at Axiomatics
Gerry Gebel, VP Business Development at Axiomatics

Other Resources

Zero Trust Through Dynamic Authorization And Policy Driven Access
Join experts from KuppingerCole Analysts, Ericom and Axiomatics for an interactive discussion on the role of fine-grained access controls in adopting Zero Trust and how best to address that challenge to meet the needs of a hybrid workforce using cloud-based applications and adopting new ways of working, such as DevOps.
The Convergence of Cloud, DevOps and Access Control
Security experts from industry-leading NTT DATA and Axiomatics are making a deep dive into migrating access control to the cloud. Follow the demonstration of how to set up a project for containerization using ALFA and Jenkins.
ABAC as code – Applying Modern DevOps to Policy Authoring
A DevOps approach to externalized business policy engineering can ensure modern CI/CD processes help IT adoption of access control policy authoring.