SlideShare una empresa de Scribd logo
1 de 19
Descargar para leer sin conexión
Atle	Skjekkeland,	SVP,	AIIM	
@skjekkeland	
askjekkeland@aiim.org	
GDPR	
How	to	Ensure	Compliance?
Era	
Years	
Typical	
thing	
managed	
Best	
known	
company	
Content	
mgmt	
focus	
Mainframe	
1960-1975	
A	batch	
transacMon	
IBM	
Microfilm	
Mini	
1975-1992	
A	dept	
process	
Digital	
Equipment	
Image	
Mgmt	
PC	
1992-2001	
A	
document	
MicrosoR	
Document	
Mgmt	
Internet	
2001-2009	
A	web	
page	
Google	
Content	
Mgmt	
Cloud,	Mobile,	
ConsumerizaMon,	
Internet	of	Things	
2010-2018	
An	
interacMon	
Facebook	
Digital	
Business	
Systems	of	Record	
Systems	of	Engagement
In	your	organizaMon,	has	non-compliance	with	good	InformaMon	Governance	pracMce	created	a	
significant	issue	with	any	of	the	following	in	the	last	2	years?		
N=334	
0%	 5%	 10%	 15%	 20%	 25%	 30%	
Internal	audits	(regulatory,	financial,	HR)	
InformaMon	Requests	(FoI,	FOIA,	Personal	data)	
Data	protecMon	compliance	and	privacy	issues	
LiMgaMon	and	discovery	
Incident	response,	business	conMnuity	
External	audits	(industry,	government)	
HR	issues	and	staff	disputes	
Regulatory	submissions	
Compliance	with	anM-compeMMon,	money	
None	of	these	
Compliance	Risks
•  The	General	Data	Protec9on	Regula9on	(GDPR)	(RegulaMon	(EU)	2016/679)	is	
a	regulaMon	by	which	the	European	Parliament,	the	European	Council	and	
the	European	Commission	intend	to	strengthen	and	unify	data	protecMon	for	all	
individuals	within	the	European	Union	(EU).		
•  It	also	addresses	the	export	of	personal	data	outside	the	EU.		
•  The	primary	objecMves	of	the	GDPR	are	to	give	ciMzens	and	residents	back	control	
of	their	personal	data	and	to	simplify	the	regulatory	environment	for	
interna9onal	business	by	unifying	the	regula9on	within	the	EU.	
•  When	the	GDPR	takes	effect	it	will	replace	the	data	protecMon	direcMve	(officially	
DirecMve	95/46/EC)	from	1995.		
•  GDPR	applies	from	25	May	2018	aRer	a	two-year	transiMon	period	and,	unlike	
a	direcMve,	it	does	not	require	any	enabling	legislaMon	to	be	passed	by	naMonal	
governments.	
General	Data	Protec9on	Regula9on
•  The	regulaMon	applies	if	the	data	
controller	(organisa9on	that	collects	
data	from	EU	residents)	or	processor	
(organisa9on	that	processes	data	on	
behalf	of	data	controller	e.g.	cloud	
service	providers)	or	the	data	subject	
(person)	is	based	in	the	EU.	
•  Furthermore	the	RegulaMon	also	
applies	to	organisa9ons	based	
outside	the	European	Union	if	they	
collect	or	process	personal	data	of	
EU	residents.	
Who	Is	It	For?
According	to	the	European	Commission:		
•  “Personal	data	is	any	informaMon	relaMng	
to	an	individual,	whether	it	relates	to	his	
or	her	private,	professional	or	public	life.”		
•  “It	can	be	anything	from	a	name,	a	
home	address,	a	photo,	an	
email	address,	bank	details,	
posts	on	social	networking	
websites,	medical	informa9on,	
or	a	computer’s	IP	address.”	
What	Type	of	Informa9on	
Unstructured	content	is	really	
important	in	relaMon	with	GDPR.
•  A	warning	in	wriMng	in	cases	of	first	and	non-intenMonal	
non-compliance.	
•  Regular	periodic	data	protecMon	audits.	
•  A	fine	up	to	10,000,000	EUR	or	up	to	2%	of	the	annual	
worldwide	turnover	of	the	preceding	financial	year	in	
case	of	an	enterprise,	whichever	is	greater	(ArMcle	83,	
Paragraph	4)).	
•  A	fine	up	to	20,000,000	EUR	or	up	to	4%	of	the	annual	
worldwide	turnover	of	the	preceding	financial	year	in	
case	of	an	enterprise,	whichever	is	greater	(ArMcle	83,	
Paragraph	5	&	6).	
Sanc9ons
(a)	processed	lawfully,	fairly	and	in	a	transparent	manner	in	relaMon	to	the	data	subject	(‘lawfulness,	
fairness	and	transparency’);	
(b)	collected	for	specified,	explicit	and	legiMmate	purposes	and	not	further	processed	in	a	manner	that	
is	incompaMble	with	those	purposes… (‘purpose	limita9on’);	
(c)	adequate,	relevant	and	limited	to	what	is	necessary	in	relaMon	to	the	purposes	for	which	they	are	
processed	(‘data	minimisa9on’);	
(d)	accurate	and,	where	necessary,	kept	up	to	date;	every	reasonable	step	must	be	taken	to	ensure	that	
personal	data	that	are	inaccurate,	having	regard	to	the	purposes	for	which	they	are	processed,	are	
erased	or	recMfied	without	delay	(‘accuracy’);	
(e)	kept	in	a	form	which	permits	idenMficaMon	of	data	subjects	for	no	longer	than	is	necessary	for	the	
purposes	for	which	the	personal	data	are	processed….	(‘storage	limita9on’);	
(f)	processed	in	a	manner	that	ensures	appropriate	security	of	the	personal	data,	including	protecMon	
against	unauthorised	or	unlawful	processing	and	against	accidental	loss,	destrucMon	or	damage,	using	
appropriate	technical	or	organisaMonal	measures	(‘integrity	and	confiden9ality’).	
Personal	Data	Shall	Be…
•  In	order	to	be	able	to	demonstrate	compliance	with	the	GDPR,	the	data	controller	
should	implement	measures	which	meet	the	principles	of	data	protec9on	by	design	
and	data	protec9on	by	default.		
•  Privacy	by	Design	and	by	Default	(ArMcle	25)	require	that	data	protecMon	measures	
are	designed	into	the	development	of	business	processes	for	products	and	services.		
•  It	is	the	responsibility	and	liability	of	the	data	controller	to	implement	effec9ve	
measures	and	be	able	to	demonstrate	the	compliance	of	processing	ac9vi9es	
even	if	the	processing	is	carried	out	by	a	data	processor	on	behalf	of	the	
controller.	(Recital	74).	
•  Data	ProtecMon	Impact	Assessments	(ArMcle	35)	have	to	be	conducted	when	
specific	risks	occur	to	the	rights	and	freedoms	of	data	subjects.	
Responsibili9es
•  Privacy	by	Design	and	by	Default	(ArMcle	25)	requires	
that	data	protecMon	is	designed	into	the	development	
of	business	processes	for	products	and	services.		
•  This	requires	that	privacy	seqngs	must	be	set	at	a	
high	level	by	default,	and	that	technical	and	
procedural	measures	should	be	taken	care	by	the	
controller	in	order	to	make	sure	that	the	processing,	
throughout	the	whole	processing	lifecycle,	complies	
with	the	regulaMon.	
•  Controllers	should	also	implement	mechanisms	to	
ensure	that	personal	data	is	only	processed	when	
necessary	for	each	specific	purpose.	
Privacy	by	Design	and	by	Default
•  Valid	consent	must	be	explicit	for	
data	collected	and	the	purposes	
data	is	used	for	(ArMcle	7;	defined	
in	ArMcle	4).		
•  Consent	for	children	must	be	given	
by	the	child’s	parent	or	custodian,	
and	verifiable	(ArMcle	8).		
•  Data	controllers	must	be	able	to	
prove	"consent"	(opt-in)	and	
consent	may	be	withdrawn.	
	Consent
•  The	GDPR	refers	to	pseudonymisaMon	as	a	process	that	transforms	personal	data	in	
such	a	way	that	the	resulMng	data	cannot	be	asributed	to	a	specific	data	subject	
without	the	use	of	addiMonal	informaMon.		
–  An	example	of	pseudonymisaMon	is	encrypMon,	which	renders	the	original	data	unintelligible	and	
the	process	cannot	be	reversed	without	access	to	the	right	decrypMon	key.		
–  The	GDPR	requires	that	this	addiMonal	informaMon	(such	as	the	decrypMon	key)	be	kept	
separately	from	the	pseudonymised	data.		
–  PseudonymisaMon	is	recommended	to	reduce	the	risks	to	the	concerned	data	subjects	and	also	
help	controllers	and	processors	to	meet	their	data-protecMon	obligaMons	(Recital	28).	
–  If	the	personal	data	is	pseudonymised	with	adequate	internal	policies	and	measures	by	the	data	
controller,	then	it	is	considered	to	be	effecMvely	anonymized,	and	not	subject	to	controls	and	
penalMes	of	the	GDPR.		
–  The	policies	and	measures	that	meet	the	principles	of	data	protecMon	by	design	and	data	
protecMon	by	default	should	be	considered	adequate	for	this	purpose.		
–  Example	measures	would	include	pseudonymizing	the	data	as	soon	as	possible	(Recital	78),	
encrypMng	the	data	locally,	keeping	the	decrypMon	keys	separately	from	the	encrypted	data.	
Pseudonymisa9on
•  ArMcle	17	provides	that	the	data	
subject	has	the	right	to	request	
erasure	of	personal	data	related	to	
them	on	any	one	of	a	number	of	
grounds	including	non-compliance	
with	arMcle	6.1	(lawfulness)	that	
includes	a	case	(f)	where	the	
legiMmate	interests	of	the	
controller	is	overridden	by	the	
interests	or	fundamental	rights	and	
freedoms	of	the	data	subject	which	
require	protecMon	of	personal	data	
Right	to	Erasure
•  A	person	shall	be	able	to	
transfer	their	personal	data	
from	one	electronic	
processing	system	to	and	
into	another,	without	being	
prevented	from	doing	so	by	
the	data	controller.		
•  In	addiMon,	the	data	must	be	
provided	by	the	controller	in	
a	structured	and	commonly	
used	electronic	format.		
•  The	right	to	data	portability	
is	provided	by	ArMcle	20	of	
the	GDPR.		
Data	Portability
•  Under	the	GDPR,	the	Data	Controller	will	be	under	a	legal	obligaMon	to	noMfy	the	
Supervisory	Authority	without	undue	delay.		
•  The	data	breach	must	be	reported	to	the	Supervisory	Authority	within	72	hours	of	
the	data	breach	(ArMcle	33).		
•  Individuals	have	to	be	noMfied	if	adverse	impact	is	determined	(ArMcle	34).		
•  However,	the	data	processor	or	controller	do	not	have	to	noMfy	the	data	subjects	if	
anonymized	data	is	breached.		
•  Specifically,		the	noMce	to	data	subjects	is	not	required	if	the	data	controller	has	
implemented	pseudonymisaMon	techniques	like	encrypMon	along	with	adequate	
technical	and	organizaMonal	protecMon	measures	to	the	personal	data	affected	by	
the	data	breach	(ArMcle	34).	
Data	Breaches
1.  IdenMfy	use	of	personal	data	and	content	to	ensure	lawfulness,	fairness	and	
transparency	
2.  Limit	purpose	and	data	minimiza9on	by	only	collecMng	informaMon	for	specified,	
explicit	and	legiMmate	purposes		
3.  Connect	data	and	content	to	get	a	unified	view	for	beser	control,	portability,	and	
deleMon	
4.  Use	metadata	to	ensure	privacy-by-design	and	by	default	compliance	
5.  Apply	retenMon	management	to	limit	storage	
6.  Use	encrypMon	at	transit	and	at	rest	to	ensure	integrity	and	confiden9ality	
7.  Use	access	control	lists,	permission	management,	and	audit	trails	to	ensure	
compliance	
7	Steps	to	GDPR	Compliance
1.	Prevent	
• 	Risk	assessments	
• 	Training	
• 	Policies	&	procedures	
• 	ExecuMve	commitment	
• 	Systems	
2.	Detect	
• 	Data	ProtecMon	Officer	
• 	Audit	
• 	Monitoring	
3.	Respond	
• 	ReporMng	
• 	InvesMgaMon	
• 	CommunicaMon		
• 	Improvements	
• 	Employee	discipline	
Prevent	
Detect	Respond	
Establish	a	Compliance	Framework
Establish	Privacy	by	Design/Default	
CRM	 ERP	 Email	
Share	
Point	
CMS	 Shared	
drives	
LOB	
apps	
Metadata	
Inbound	logisMcs	 ProducMon	
Outbound	
logisMcs	
MarkeMng	
&	Sales	
Service	&	
Support	
Metadata	
extracMon	
and	
metadata	
management	
is	key	for	
managing	
unstructured	
content	in	
relaMon	with	
GDPR.
“OrganizaMonal	
culture	eats	strategy	
for	breakfast,	lunch	
and	dinner”	– Peter	
Drucker.			
Keep	IT	Simple	and	Smart	
New	IT:	 	Old	IT:

Más contenido relacionado

La actualidad más candente

General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...Cvent
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by QualsysQualsys Ltd
 
2019 04-17 10 steps to ccpa compliance
2019 04-17 10 steps to ccpa compliance2019 04-17 10 steps to ccpa compliance
2019 04-17 10 steps to ccpa complianceTrustArc
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) Kimberly Simon MBA
 
General Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) ComplianceGeneral Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) Complianceaccenture
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protectionsp_krishna
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security ManagementMark Conway
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness trainingSAROJ BEHERA
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykEryk Budi Pratama
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...IT Governance Ltd
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityJisc Scotland
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubKaushal Trivedi
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentationMidhun Nirmal
 
GDPR Introduction and overview
GDPR Introduction and overviewGDPR Introduction and overview
GDPR Introduction and overviewJane Lambert
 
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information StandardQuick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information StandardPECB
 
California Consumer Privacy Act (CCPA): Countdown to Compliance
California Consumer Privacy Act (CCPA): Countdown to ComplianceCalifornia Consumer Privacy Act (CCPA): Countdown to Compliance
California Consumer Privacy Act (CCPA): Countdown to ComplianceTinuiti
 

La actualidad más candente (20)

GDPR
GDPRGDPR
GDPR
 
An Overview of GDPR
An Overview of GDPR An Overview of GDPR
An Overview of GDPR
 
Introduction to GDPR
Introduction to GDPRIntroduction to GDPR
Introduction to GDPR
 
General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...General Data Protection Regulations (GDPR): Do you understand it and are you ...
General Data Protection Regulations (GDPR): Do you understand it and are you ...
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
2019 04-17 10 steps to ccpa compliance
2019 04-17 10 steps to ccpa compliance2019 04-17 10 steps to ccpa compliance
2019 04-17 10 steps to ccpa compliance
 
General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR) General Data Protection Regulation (GDPR)
General Data Protection Regulation (GDPR)
 
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdfAll about a DPIA by Andrey Prozorov 2.0, 220518.pdf
All about a DPIA by Andrey Prozorov 2.0, 220518.pdf
 
General Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) ComplianceGeneral Data Protection Regulation (GDPR) Compliance
General Data Protection Regulation (GDPR) Compliance
 
Privacy & Data Protection
Privacy & Data ProtectionPrivacy & Data Protection
Privacy & Data Protection
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness training
 
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_ErykData Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
Data Protection Indonesia: Basic Regulation and Technical Aspects_Eryk
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
Introduction to Data Protection and Information Security
Introduction to Data Protection and Information SecurityIntroduction to Data Protection and Information Security
Introduction to Data Protection and Information Security
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
GDPR Introduction and overview
GDPR Introduction and overviewGDPR Introduction and overview
GDPR Introduction and overview
 
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information StandardQuick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
Quick Guide to ISO/IEC 27701 - The Newest Privacy Information Standard
 
California Consumer Privacy Act (CCPA): Countdown to Compliance
California Consumer Privacy Act (CCPA): Countdown to ComplianceCalifornia Consumer Privacy Act (CCPA): Countdown to Compliance
California Consumer Privacy Act (CCPA): Countdown to Compliance
 

Similar a [Presentation] GDPR - How to Ensure Compliance

ACC 626 Slidecast
ACC 626 SlidecastACC 626 Slidecast
ACC 626 SlidecastKieng Iv
 
Thinking about Technology, Risk, and Change Management Through a Social Lens
Thinking about Technology, Risk, and Change Management Through a Social LensThinking about Technology, Risk, and Change Management Through a Social Lens
Thinking about Technology, Risk, and Change Management Through a Social LensJohn Mancini
 
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business PeopleDSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business PeopleAndris Soroka
 
IT Disaster Recovery & Business Continuity
IT Disaster Recovery & Business ContinuityIT Disaster Recovery & Business Continuity
IT Disaster Recovery & Business Continuitymascot4u
 
IBM Big Data Views for corporate & Startups
IBM Big Data  Views for corporate & StartupsIBM Big Data  Views for corporate & Startups
IBM Big Data Views for corporate & StartupsMarco Laucelli
 
UNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITYUNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITYForgeRock
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomIBM Security
 
ICIS '97 The e-Business of e-Commerce - Question #2
ICIS '97 The e-Business of e-Commerce - Question #2ICIS '97 The e-Business of e-Commerce - Question #2
ICIS '97 The e-Business of e-Commerce - Question #2Frank Braski
 
The Law Of Unintended Consequences
The Law Of Unintended ConsequencesThe Law Of Unintended Consequences
The Law Of Unintended ConsequencesCorporate Oasis Inc.
 
The Law Of Unintended Consequences
The Law Of Unintended ConsequencesThe Law Of Unintended Consequences
The Law Of Unintended Consequencesprobinson99
 
Steve Mills Senior Vice President and Group Executive IBM Software and Systems
Steve Mills Senior Vice President and Group Executive IBM Software and SystemsSteve Mills Senior Vice President and Group Executive IBM Software and Systems
Steve Mills Senior Vice President and Group Executive IBM Software and SystemsIBM India Smarter Computing
 
Maximize Your MarTech Stack
Maximize Your MarTech StackMaximize Your MarTech Stack
Maximize Your MarTech StackRon Corbisier
 
Building the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your CompanyBuilding the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your CompanyAIIM International
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011subramanian K
 
How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?John Mancini
 
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...Assespro Nacional
 
Info360 Keynote by AIIM President John Mancini
Info360 Keynote by AIIM President John ManciniInfo360 Keynote by AIIM President John Mancini
Info360 Keynote by AIIM President John ManciniJohn Mancini
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Enterprise Management Associates
 

Similar a [Presentation] GDPR - How to Ensure Compliance (20)

ACC 626 Slidecast
ACC 626 SlidecastACC 626 Slidecast
ACC 626 Slidecast
 
Thinking about Technology, Risk, and Change Management Through a Social Lens
Thinking about Technology, Risk, and Change Management Through a Social LensThinking about Technology, Risk, and Change Management Through a Social Lens
Thinking about Technology, Risk, and Change Management Through a Social Lens
 
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business PeopleDSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
 
IT Disaster Recovery & Business Continuity
IT Disaster Recovery & Business ContinuityIT Disaster Recovery & Business Continuity
IT Disaster Recovery & Business Continuity
 
IBM Big Data Views for corporate & Startups
IBM Big Data  Views for corporate & StartupsIBM Big Data  Views for corporate & Startups
IBM Big Data Views for corporate & Startups
 
UNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITYUNLEASHING BUSINESS VALUE WITH IDENTITY
UNLEASHING BUSINESS VALUE WITH IDENTITY
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
Financial Impact of BYOD Programs
Financial Impact of BYOD ProgramsFinancial Impact of BYOD Programs
Financial Impact of BYOD Programs
 
ICIS '97 The e-Business of e-Commerce - Question #2
ICIS '97 The e-Business of e-Commerce - Question #2ICIS '97 The e-Business of e-Commerce - Question #2
ICIS '97 The e-Business of e-Commerce - Question #2
 
The Law Of Unintended Consequences
The Law Of Unintended ConsequencesThe Law Of Unintended Consequences
The Law Of Unintended Consequences
 
The Law Of Unintended Consequences
The Law Of Unintended ConsequencesThe Law Of Unintended Consequences
The Law Of Unintended Consequences
 
Steve Mills Senior Vice President and Group Executive IBM Software and Systems
Steve Mills Senior Vice President and Group Executive IBM Software and SystemsSteve Mills Senior Vice President and Group Executive IBM Software and Systems
Steve Mills Senior Vice President and Group Executive IBM Software and Systems
 
Maximize Your MarTech Stack
Maximize Your MarTech StackMaximize Your MarTech Stack
Maximize Your MarTech Stack
 
Unifying IT for Digital War Room Performance
Unifying IT for Digital War Room PerformanceUnifying IT for Digital War Room Performance
Unifying IT for Digital War Room Performance
 
Building the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your CompanyBuilding the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your Company
 
Security architecture rajagiri talk march 2011
Security architecture  rajagiri talk march 2011Security architecture  rajagiri talk march 2011
Security architecture rajagiri talk march 2011
 
How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?How can social technologies be used to drive processes and innovation?
How can social technologies be used to drive processes and innovation?
 
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
Internal Report - CompTIA Inernational Technology Adoption & Workforce Issues...
 
Info360 Keynote by AIIM President John Mancini
Info360 Keynote by AIIM President John ManciniInfo360 Keynote by AIIM President John Mancini
Info360 Keynote by AIIM President John Mancini
 
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
Investing in Digital Threat Intelligence Management to Protect Your Assets ou...
 

Más de AIIM International

Create, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational ValueCreate, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational ValueAIIM International
 
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...AIIM International
 
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...AIIM International
 
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...AIIM International
 
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...AIIM International
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...AIIM International
 
[Webinar Slides] New Approaches to Classification and Retention for Organizat...
[Webinar Slides] New Approaches to Classification and Retention for Organizat...[Webinar Slides] New Approaches to Classification and Retention for Organizat...
[Webinar Slides] New Approaches to Classification and Retention for Organizat...AIIM International
 
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...AIIM International
 
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...AIIM International
 
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence ChannelsAIIM International
 
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...AIIM International
 
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...AIIM International
 
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part TwoAIIM International
 
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...AIIM International
 
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...AIIM International
 
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...AIIM International
 
[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern Solutions[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern SolutionsAIIM International
 
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...AIIM International
 
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...AIIM International
 

Más de AIIM International (20)

2022 IIM Infographic.pptx
2022 IIM Infographic.pptx2022 IIM Infographic.pptx
2022 IIM Infographic.pptx
 
Create, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational ValueCreate, Capture, Collaborate - Your Content Drives Organizational Value
Create, Capture, Collaborate - Your Content Drives Organizational Value
 
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
Meet the Expert Panel - 2021 State of the Intelligent Information Management ...
 
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
[Webinar Slides] Maximizing Workforce Capacity - Proven Practices for Saving ...
 
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
[Webinar Slides] When Your Current Systems No Longer Help You Do Your Job, It...
 
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
[Webinar Slides] Information Access and Information Control: Two Cloud Conten...
 
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
[Webinar Slides] Data Privacy for the IM Practitioner - Practical Advice for ...
 
[Webinar Slides] New Approaches to Classification and Retention for Organizat...
[Webinar Slides] New Approaches to Classification and Retention for Organizat...[Webinar Slides] New Approaches to Classification and Retention for Organizat...
[Webinar Slides] New Approaches to Classification and Retention for Organizat...
 
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
[Webinar Slides] Driving Digital Change With O365 & Intelligent Information M...
 
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
[Webinar Slides] Working Faster and Smarter in a Digital Transforming World W...
 
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
[Webinar Slides] Using AI to Easily Automate All of Your Correspondence Channels
 
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
[Webinar Slides] Capture Leaders & Their Projects: We Asked, They Answered. D...
 
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
[Webinar Slides] eSignatures: Learn How This Technology Can Revolutionize You...
 
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two[Webinar Slides] Your 2019 Information Management Resolution: Part Two
[Webinar Slides] Your 2019 Information Management Resolution: Part Two
 
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
 
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
[Webinar Slides] It All Starts Here— Effectively Capturing Paper and Digital ...
 
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
[Webinar Slides] Improving your Organization’s Collaborative and Case-Centric...
 
[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern Solutions[Webinar Slides] Modern Problems Require Modern Solutions
[Webinar Slides] Modern Problems Require Modern Solutions
 
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
[Webinar Slides] Dreading Your Data Migration Project? 3 Ways Robotic Process...
 
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
[AIIM18] Beyond Human Capacity: Using analytics to scale your everyday inform...
 

Último

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 

Último (20)

Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

[Presentation] GDPR - How to Ensure Compliance