Webcast

How to implement a data security plan in light of the CCPA

Presented by

Sid,Product expert

Vivin,Product expert

Why watch this webcast?

At the stroke of the midnight hour on January 1, 2020, the CCPA will come into effect in California. Many Americans feel that this is just a precursor to a federal law. The CCPA will give consumers many new rights and privileges, and will force businesses to improve their security posture.

In this webcast, our compliance experts will explore how organizations can implement an effective data security plan in light of the CCPA. They will also discuss three real-life pathbreaking scenarios under the CCPA.

Agenda:

  • Introduction to the CCPA
  • Key data privacy concepts and what it means to us
  • Responding to new customer requests under the CCPA: Some use cases
  • Developing a data security strategy
  • How you can make your organization compliance-ready
  • 2Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 3Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 4Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.

Thanks!

Your e-book is on its way.

If you don't find it in your inbox within the next few minutes, check your spam folder.

Watch Now

  • Please enter a business email id
  •  
  • By clicking 'Play now', you agree to processing of personal data according to the Privacy Policy.

Zoho Corporation Pvt. Ltd. All rights reserved.

Claim Your Spot Now