Free webinar

From CCPA 1.0 to CCPA 2.0: Everything IT admins should know

  • October 17 at  02 PM PDT
  • 45 Mins

Presented by

Jay,Product expert

The California Consumer Privacy Act of 2018 (CCPA), similar to Europe's GDPR will affect all organizations doing business in California that collect personal information from their consumers. If your organization is affected by a data breach, CCPA allows your consumers to sue your organization for compromising their personal data. 

We'll discuss the implications of CCPA for both consumers and businesses as well as understand the consequences of CCPA 2.0. We'll also explain the steps that you can implement to secure your consumer's personal data.  

In this webinar, we'll cover:

  • How CCPA affects consumers and businesses.
  • What are the rights of consumers under CCPA.
  • What measures should you take to comply with CCPA.
  • How CCPA 2.0 is different from CCPA 1.0.
  • How organizations can secure their consumers' personal data.
  • 2Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 3Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 4Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.

Register for the webinar

User already registered
  • Please enter your name Please enter your email Please enter a business email address
  • Please enter your phone number
  • Select time zone
     
  • By clicking 'Claim Your Spot Now', you agree to processing of personal data according to the Privacy Policy.

© 2019 Zoho Corporation Pvt. Ltd. All rights reserved.

Claim Your Spot Now
×

We don't want you to miss out!

Busy that day? That's okay! Register anyway, and we'll email you a recording of the webinar.

  • Please enter a business email id
  •  
  • By clicking 'Register', you agree to processing of personal data according to the Privacy Policy.