Search

1 to 6 of 6
Sort by

Blog Entry
Protecting data across its lifecycle with governance and security

Exploring best practices for data in use and data in motion Author: Karen Madera Organizations collect a tremendous amount of data from a variety of sources and any of these data sources could potentially contain sensitive data. Data is often relocated for warehousing, reporting,...

CYNTHIA LUU's profile image

Blog Entry
Introducing 1touch.io to the IBM Security Family!

Security and privacy start with a basic premise: there is something sensitive that needs to be protected or kept away from some unnamed foe. Addressing data security and privacy is by no means an easy task – it requires a cultural shift as well as technology that complements and integrates. So...

CYNTHIA LUU's profile image


Library Entry
Replay - Tech Session: Customizing Breach Response in the EU

In this tech session join Sean Quinn, Privacy Associate for IBM Resilient, and learn about the customization of the Resilient SOAR platform to best fit your regulatory environment in the EU. The Resilient Privacy Add-On can be adapted for the rapidly changing legal landscape that has to be...

OctSeanEUPrivacyWebinar.mp4


Library Entry
Replay - Tech Session: Customizing Breach Response in the U.S.

In this tech session join Sean Quinn, Privacy Associate for IBM Resilient, and learn about the customization of the Resilient SOAR platform to best fit your regulatory environment. The Resilient Privacy Add-On can be adapted for the rapidly changing legal landscape that has to be navigated...

USPrivacySeanOctWebinar.mp4


Blog Entry
Consent Management for CCPA in IBM InfoSphere Master Data Management

Product: Infosphere Master Data Management Version: 11.6.0.7 The Consent Management in IBM InfoSphere MDM provides you the capability to centrally capture and manage consent as required by various data protection and privacy requirements, such as California Consumer...

Mohammad Khatibi's profile image