Virtual Event: How to Avoid Being a Headline Story —Building a Data Security Action Plan

Join us for a free Virtual Event on Thursday, October 4th, 2018 from 11 am-3 pm EDT to hear industry leading professionals share their experiences, best practices, and ideas on how you can work to ensure data privacy and information security to comply with new business-critical challenges.

How to Avoid Being a Headline Story —Building a Data Security Action Plan

Cybersecurity is at the top of just about every C-level “what keeps me up at night” list. Consider this Top 10 worry list from TechRepublic:

1.Ransomware
2.Getting breached and the media catching it first
3.GDPR
4.Consumers taking tech breaks
5.Protecting themselves and critical vendors
6.Having a false sense of security
7.The team’s well-being
8.Large-scale data breaches
9.Employees’ lack of cybersecurity skills
10.Security issues with IoT and BYOD

Unstructured information — content in all of its forms — represents a particularly tough challenge when it comes to data security and privacy: 

• Only 40% of organizations have automated processes to ensure deletion of personal information from email, SharePoint, and shared drives 
• Information privacy lacks a dedicated focus point of accountability in 64% of organizations 
• 48% of organizations describe the maturity level of their companies’ information governance policies as “poor” or “extremely poor” 
• Only 30% of organizations say they are fully compliant with GDPR 

 

In this Virtual Event, we’ve gathered professionals to share their stories of working to ensure data privacy and information security in order to comply with new obligations like the GDPR.  Supported by recent AIIM research, we’ll explore: 

• How organizations view the emerging challenges tied to information privacy and security, and whom have they charged with this task 
• Where are organizations in their data privacy/security journey; how improving records management practices is having an impact; and how are they assessing their progress in meeting core regulatory requirements, such as GDPR 
• What kinds of special pain points does unstructured information (i.e. content) raise when examined from a data privacy perspective 
• The core IIM technologies organizations see as critical to their efforts: ERM, automated recognition & extraction, BPM, cloud content management, records management, and others 


Join AIIM and a dozen industry leading professionals as they share their experiences, best practices, and ideas on how you can address these same business-critical challenges. 


The live event will be Thursday, October 4th, 2018 from 11 am-3 pm EDT (Eastern North American Time)   

Other North American time zones: 10 am - 2 pm CDT; 9 am - 1 pm MDT; 8 am - 12 noon PDT   

In Europe, the event runs from 4 pm - 8 pm UK Time (GMT); 5 pm - 9 pm Central Europe Time

**As a reminder, if this time does not work for you, a replay will be sent out to anyone who registered shortly after the event ends**



Register Now

By registering for this event, you agree to: be contacted by us about this event and for other invitations that would be of interest; and have your contact information, including email, passed on to the limited sponsors of this event for the purpose of following up on your interest in this topic.

Sneak Peek Agenda



Data Privacy/Security Concerns Keeping You Up at Night? 5 Steps to Help You Sleep Once Again

When we talk about modernizing your information toolkit we're also emphasizing modernizing your
organizational architecture and do it in a way to get from here to there without the wheels falling off
the
bus.
By employing things like cloud content management; internal and external collaboration platforms;
low
-
code and “self
-
service” development platforms; and content integration and migration tools
How Organizations Are Facing the Emerging Challenges of Information Privacy and Security

When we talk about modernizing your information toolkit we're also emphasizing modernizing your
organizational architecture and do it in a way to get from here to there without the wheels falling off
the
bus.
By employing things like cloud content management; internal and external collaboration platforms;
low
-
code and “self
-
service” development platforms; and content integration and migration tools
Top Tips to Building a Data Security Action Plan

When we talk about modernizing your information toolkit we're also emphasizing modernizing your
organizational architecture and do it in a way to get from here to there without the wheels falling off
the
bus.
By employing things like cloud content management; internal and external collaboration platforms;
low
-
code and “self
-
service” development platforms; and content integration and migration tools
What Are the Best Practices for Data Privacy and Security? It All Depends…

When we talk about modernizing your information toolkit we're also emphasizing modernizing your
organizational architecture and do it in a way to get from here to there without the wheels falling off
the
bus.
By employing things like cloud content management; internal and external collaboration platforms;
low
-
code and “self
-
service” development platforms; and content integration and migration tools
Learn How Strong Records Management and Information Governance Strengthens Data Privacy

When we talk about modernizing your information toolkit we're also emphasizing modernizing your
organizational architecture and do it in a way to get from here to there without the wheels falling off
the
bus.
By employing things like cloud content management; internal and external collaboration platforms;
low
-
code and “self
-
service” development platforms; and content integration and migration tools
Did You Find ALL of 'Mary Smith's' Information? Gathering the Lurking Personally Identifiable Information (PII) from Unseen and Unknown Places

When we talk about modernizing your information toolkit we're also emphasizing modernizing your
organizational architecture and do it in a way to get from here to there without the wheels falling off
the
bus.
By employing things like cloud content management; internal and external collaboration platforms;
low
-
code and “self
-
service” development platforms; and content integration and migration tools
The Right to Be Forgotten: Pulling the Plug on the Right Data at the Right Time

When we talk about modernizing your information toolkit we're also emphasizing modernizing your
organizational architecture and do it in a way to get from here to there without the wheels falling off
the
bus.
By employing things like cloud content management; internal and external collaboration platforms;
low
-
code and “self
-
service” development platforms; and content integration and migration tools
Data Portability: Learn How to Provide Machine-readable Data When the Need Arises

When we talk about modernizing your information toolkit we're also emphasizing modernizing your
organizational architecture and do it in a way to get from here to there without the wheels falling off
the
bus.
By employing things like cloud content management; internal and external collaboration platforms;
low
-
code and “self
-
service” development platforms; and content integration and migration tools
Hear Case Studies of how Organizations Like Yours Are Succeeding in Their Data Privacy and Security Practices

When we talk about modernizing your information toolkit we're also emphasizing modernizing your
organizational architecture and do it in a way to get from here to there without the wheels falling off
the
bus.
By employing things like cloud content management; internal and external collaboration platforms;
low
-
code and “self
-
service” development platforms; and content integration and migration tools

Data Security Event Resources

Take a look at the resources we've put together in one convenient location. Cases studies, white papers, webinars, and infographics - all there for you to download and be inspired by.

Back to Top Back to Top