Free webinar

From CCPA 1.0 to CCPA 2.0: Everything IT admins should know

Closed

Presented by

Jay,Product expert

The California Consumer Privacy Act of 2018 (CCPA), similar to Europe's GDPR will affect all organizations doing business in California that collect personal information from their consumers. If your organization is affected by a data breach, CCPA allows your consumers to sue your organization for compromising their personal data. 

We'll discuss the implications of CCPA for both consumers and businesses as well as understand the consequences of CCPA 2.0. We'll also explain the steps that you can implement to secure your consumer's personal data.  

In this webinar, we'll cover:

  • How CCPA affects consumers and businesses.
  • What are the rights of consumers under CCPA.
  • What measures should you take to comply with CCPA.
  • How CCPA 2.0 is different from CCPA 1.0.
  • How organizations can secure their consumers' personal data.
  • 2Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 3Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 4Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.

Closed

Zoho Corporation Pvt. Ltd. All rights reserved.

Claim Your Spot Now