Posted on
in Presentations
Should the privacy officer be involved in the development of your insider threat program? Should the communications department reach to the privacy office when they receive a media inquiry regarding an employee who was arrested over the weekend? Should the IT department have a privacy subject matter expert review the requirements for a new IT system they are planning to procure? Yes, yes and yes!
Learning Objectives:
1: Explore how to determine what projects and programs have privacy equities.
2: Learn how to get invited to the table to ensure privacy equities are addressed.
3: Discover how to make an impact and use privacy as a value-add/differentiator.
Learning Objectives:
1: Explore how to determine what projects and programs have privacy equities.
2: Learn how to get invited to the table to ensure privacy equities are addressed.
3: Discover how to make an impact and use privacy as a value-add/differentiator.
Access This and Other RSAC™ Conference Presentations with Your Free RSAC Membership
Your RSAC™ Membership also includes AI-powered summaries, mind maps, and slides for Conference presentations, Group Discussions with experts, and more.
Watch Now >>
Share With Your Community