A Practical Approach to GDPR Requirements

At the time of this webinar, many enterprises are/were finalizing their plans for addressing new requirements of the GDPR directive. GDPR has both a business and a technical impact, which is particularly challenging when the enforcement regime is so unclear at this point in time.

GDPR webinar

In this webinar, experts from EY and Axiomatics discuss the following topics in an effort to provide practical guidance to enterprises that fall under the purview of this new directive:

-What data is covered by GDPR?
-Privacy by design is paramount
-Data protection processes must be defined and documented
-Evidence of consent management and enforcement
-Developing a reference architecture for Data Subject Rights

Hosted by:

Atul Ojha, EY Manager of National Advisory, Cybersecurity
Måns Håkansson, Solutions Architect at Axiomatics
Gerry Gebel, VP Business Development at Axiomatics

Other Resources

The Convergence of Cloud, DevOps and Access Control
Security experts from industry-leading NTT DATA and Axiomatics are making a deep dive into migrating access control to the cloud. Follow the demonstration of how to set up a project for containerization using ALFA and Jenkins.
ABAC as code – Applying Modern DevOps to Policy Authoring
A DevOps approach to externalized business policy engineering can ensure modern CI/CD processes help IT adoption of access control policy authoring.
Taking an identity-centric approach to a modern security architecture
Federal agencies invest heavily in protecting data from external threat actors, but the insider threat problem requires a new approach to access control. While protecting data is paramount, that requirement must be balanced with the need to share certain information across a variety of use case scenarios within and across agencies/departments.