Free webinar

How to implement a data security plan in light of the CCPA

  • December 3 at 2 PM PST
  • 45 Mins

Presented by

Sid,Product expert

Vivin,Product expert

Why attend this webinar?

It is now only a matter of 28 days. At the stroke of the midnight hour on January 1, 2020, the CCPA will come into effect in California. Many Americans feel that this is just a precursor to a federal law. The CCPA will give consumers many new rights and privileges, and will force businesses to improve their security posture.

In this webinar, our compliance experts will explore how organizations can implement an effective data security plan in light of the CCPA. They will also discuss three real-life pathbreaking scenarios under the CCPA.

Agenda:

  • Introduction to the CCPA
  • Key data privacy concepts and what it means to us
  • Responding to new customer requests under the CCPA: Some use cases
  • Developing a data security strategy
  • How you can make your organization compliance-ready
  • 2Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 3Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 4Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.

Thanks!

Your e-book is on its way.

If you don't find it in your inbox within the next few minutes, check your spam folder.

Closed

Zoho Corporation Pvt. Ltd. All rights reserved.

Claim Your Spot Now