Join us for this webinar to accelerate your CCPA readiness, improve your risk management strategies, and prepare for fulfilling your CCPA obligations.
Objectives of the Presentation
Why Should you Attend
- The CCPA definition of personal data
- CCPA requirements
- How CCPA affects U.S.-based enterprises
- State-of-play on compliance
- Data management challenges
- Steps you must take to be compliant
- Approaches and solutions to CCPA requirements
Join us as Dr. Davis covers what CCPA is, whom it affects, and what fundamental obligations it places on businesses. Additionally, Dr. Davis will help you assess your organization's readiness and determine the most suitable compliance strategies to minimize risk exposure. Dr. Davis will also provide recommendations and introduce solutions that businesses may consider in preparation for CCPA's expected July 1, 2020 enforcement date.
Willfully violating CCPA can cause enterprise discontinuance. The CCPA enforcement clock is ticking!
Who will Benefit
- Overview: CCPA requirements, enterprises affected, the risks, the deadlines
- What do you need to do today to ensure compliance with CCPA?
- How to get started in handling consumer data?
- What do you need to do to identify risks in your processes?
- What are the minimal controls, policies, and technology you must have in place by July 1, 2020?
- How to prove compliance with CCPA mandates?
- Chief Information Security Officers
- Information Security Directors
- Data governance and management professionals
- Staff Attorneys
- Privacy and Compliance Professionals
- Human Resources Professionals
- Risk management professionals and Auditors tasked with compliance and risk transfer
- Data Protection Officers
- Chief Information Officers/Chief Technology Officers
- Internal Audit Managers and Staff
- Information Technology Security Officers
- Information Technology, Data Consultants, and project managers involved in data protection, information security, or cybersecurity issues
Security threats can hinder or reduce the possibility of business and information technology objective achievement, value creation, and value preservation. Ethically, management must protect the organization's information assets from potential external and internal threats that can compromise confidentiality, integrity, and availability to preserve processing, presentation, and use-value. Legally, within the information security control system, corporate manager-leaders as agents are responsible and accountable for deploying controls inhibiting security breaches mandated by laws and regulations. Information security management should actively participate in ensuring their enterprise has an appropriate control environment (CE) that protects information assets.
An enterprise's CE can provide discipline and structure to processes ensuring the adequate addressing of operational, financial, and compliance requirements. As an integrated component, technology has and will continue to influence the CE as well as assume activity change agent responsibility. Nevertheless, technological development and deployment have inextricable connectivity to the economic, social, political, and informational factors prevailing in the enterprise's CE.