Advanced data analytics and AI may be the engine of an innovative company. But data-driven enterprises, beware: if you’re careless about how you collect, transmit, and secure that data, you could drive your business into the ground. Cyber attackers are exposing companies' most precious secrets. Regulators and legislators in the US and across the globe are sanctioning and fining companies hundreds of millions of dollars for flouting data privacy and security policies. Corporations are now making changes to their IT infrastructure, buying different cloud services, redesigning applications, installing new data management/security products, hiring specialized staff, and choosing to forgo certain IT projects altogether because of increasing regulations, increasing data breaches, and increasing public scrutiny. In this Interop event, get an up-to-date map of the data privacy landscape and learn how your business can take advantage of the best data analytics has to offer, while still maintaining security, compliance, and customer trust.
Keynote: How Good Data Goes Very Very Bad
In the pursuit of better customer insights, organizations may gather more personally identifiable data, and employ advanced analytics and AI. However, when these businesses aren’t careful with security and governance, things can go awry in a big way. Here are stories of the worst data breaches and disasters that have come before, and forecasts of what’s to come.
Data Privacy Regulation Landscape for 2022: New Pitfalls to Avoid
US companies with international operations face a patchwork of different data privacy laws and regulations to comply with. Rules even vary state to state. To comply with these ever-evolving rules, businesses must constantly monitor the data privacy regulation landscape. This session will explore the most significant privacy law changes coming in 2022 and what IT teams need to know right now to prepare.
AI Attacks, Abuse and Misuse
AI is linked with positive use cases such as chatbots, robo-investors and self-driving cars. But just as the technology is fueling innovation for good, hackers are exploiting it for ill gain. In this session learn how AI tools are being used maliciously, how your company’s AI tools can be manipulated by attackers, and how improper use of AI tools could get you in trouble later.
Privacy Checklist For Your Next Digital Transformation Project
The need for enterprises to improve business processes, save costs, and keep their employees safe has never been greater. At the same time, the nature of devices and applications is changing – data collection and real-time processing are becoming increasingly important in helping enterprises gain a competitive advantage and develop new products. As a result, latency and bandwidth are becoming key performance determinants, driving the need for more computing power to be placed closer to end users and machines. This poses unique security and management challenges that enterprises will need to solve. This session explores the growing need for computing and storage at the edge and how hyper-converged infrastructure (HCI) can alleviate configuration, deployment, and management complexities.
Data Governance Tools & Techniques for a Data-Driven Business
It’s not sexy, but solid data governance can help your organization minimize risk, reduce costs and increase the value of your data. Equally important: data governance is about enabling employees to make better decisions by giving them relevant, trustworthy and easy-to-find data. This session shares best practices for data governance in the age of analytics.
How Automation Can Make Data Security Easier (and Breaches Less Painful)
The majority of cybersecurity alerts go ignored each day due to sheer volume. Security automation technology reduces the need for overworked security analysts to manually weed through thousands—if not millions—of alerts each year, thus enabling organizations to detect, investigate and remediate cyberthreats without human intervention. This session shares the latest in security automation tools, techniques and best practices.