FREE WEBINAR

Keeping up with compliance regulations: The GDPR, CCPA, and beyond

  • August 28 at  11.30 AM IST | 10 AM EDT
  • 45 Mins

Presented by

Niyathi, Product expert

About this webinar

The data regulation storm is sweeping the world. First, the GDPR transformed the way companies operating in the European Union handled their data, and now, the CCPA is poised to do the same in California. Adding to that, similar laws are being discussed in other US states and in various countries around the world. 

So how do these regulations affect businesses and the way they process data? And what level of control do customers have over their data? In this webinar, our IT compliance expert answers these questions and more. Sign up now to learn how your business can simplify its transition into the new era of strict data regulation.

Agenda

  • About the global data regulation trend
  • The shifting meaning of "personal data"
  • How customers are regaining control of their data
  • Key focus areas for businesses:
    1. Data management practices
    2. Business processes
    3. Data security
  • 2Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 3Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 4Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.

Watch Now

User already registered

Zoho Corporation Pvt. Ltd. All rights reserved.

Claim Your Spot Now