Start collaborating
Join us for IBM TechXchange Day: AI and Automation
Watch the On-Demand Webinar Today
The slides are available to download below and please share any of your questions here.SummaryThere’s little risk in asserting that an organization today—regardless of industry—can operate without data, so there is a high likelihood that you are reading this and wondering “yeah, we have a ton, what can I do about it.”The waves of data created by customers, processes, R&D, financial transactions, patient vitals, behavioral analytics and on and on crash against the shores of your business operation. And further, an ever-growing list of privacy regulations, guide the data tides—influencing how data is used in the applications, experiences and products that helped to create it in the first place. It’s an endless, value cycle of optimization and growth.But that cycle can lead to disorganization. Where is the sensitive data? How is it used and who uses it? And most important—and often unanswerable—who owns the governance and security of that data?On this virtual panel, experts including IBM Security’s Data Security CTO; Lead Product Manager for IBM Security Discover and Classify; 1touch.io’s Chief Technology Officer; and the Director of Information Security Risk and Compliance for Wyndham Resorts try to answer those questions to help you get a handle on your data—to meet compliance, prevent a breach, and allow your line of business counterparts to unlock the value of the data.Watch today as we discuss:
Speakers
Walid Rjaibi, CTO for Data Security, IBM Security
Brian Valiquette, Director of Information Security Risk and Compliance for Wyndham Resorts
Itzhak Assaraf, CTO, 1touch.io
Nagendra Pattavardhanam, Sr. Product Manager, IBM Security