Subject: | |
From: | |
Reply To: | |
Date: | Thu, 23 May 2013 10:47:44 +0100 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
Full details and a link to registration can be found here:
http://www.pwc.co.uk/events/information-governance-an-integrated-approach-to-your-data-06-06-13.jhtml
A similar roundtable (not panel) discussion will be held in Birmingham on
the 03 July; for details and registration visit
http://www.pwc.co.uk/events/an-integrated-approach-to-protecting-your-data-03072013.jhtml
************
Building on May's PwC Fraud Academy event on corporate espionage, join this
lively discussion on how managing your 'big data' through a combination of
policy, defensible disposal practices, and user communication and training
can mitigate the risks associated with insider threat and online criminal
activity.
At this eye-opening discussion you can hear from our experienced panel of:
- Umang Paw - PwC Forensic Services Director and e-Discovery specialist
- Jonathan Nugent - PwC Legal Solicitor
- Dr Philipp Raether - Legal Counsel and Global Lead Data Management &
Protection, UBS
- David Evans - Group Manager - Business and Industry, Information
Commissioner's Office (ICO)
Based on their experiences and using real life examples, the panellists
will explore the trade-offs organisations make as they balance the legal,
regulatory, security, privacy and business requirements for handling
information and making sense of their ‘big data.’
*Key topic areas will include:*
- Using data retention policies and defensible disposal techniques to
reduce the volume of information available to online criminals
- Linking records management, security and privacy initiatives to
protect intellectual property and other vital information assets from
insider threat
- Understanding the organisation’s risk appetite and prioritising how to
comply with competing international laws and regulations for data handling
and retention
- Knowing the organisation's ability and agility to respond to incidents
and discovery requests
- Using technology to enable retention and disposition in compliance
with a retention schedule
- Some recent examples and case studies
This event will be of interest to a range of practitioners in internal
audit, records management, security, compliance, legal and privacy teams.
List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance
To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]
|
|
|