article thumbnail

How to protect healthcare and life-sciences data from a cyber attack pandemic

Thales Cloud Protection & Licensing

How to protect healthcare and life-sciences data from a cyber attack pandemic. According to analyst firm IDC , 93% of pharmaceutical companies and 72% of biotech companies already have business-critical applications in the cloud, including product lifecycle management, analytics, revenue management, and much more. Data security.

article thumbnail

The Value of Data Governance and How to Quantify It

erwin

erwin recently hosted the second in its six-part webinar series on the practice of data governance and how to proactively deal with its complexities. Led by Frank Pörschmann of iDIGMA GmbH, an IT industry veteran and data governance strategist, the second webinar focused on “ The Value of Data Governance & How to Quantify It.”.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BEST PRACTICES: Rising complexities of provisioning identities has pushed ‘IGA’ to the fore

The Last Watchdog

This is, in large part, because the complexity of business networks continues to escalate at a time when compliance mandates are intensifying. Compliance matters. As complexity has intensified, so have compliance challenges. This goes beyond taking a check-the-box approach to compliance. Talk more soon.

article thumbnail

Q&A: How AI, digital transformation are shaking up revenue management in high tech, life sciences

The Last Watchdog

-based life sciences and high-tech manufacturing companies sheds light on how digital transformation – and the rising role of third-party partners – have combined to create unprecedented operational challenges in the brave new world of digital commerce. LW: How has the revenue generation landscape shifted over the past few years?

article thumbnail

The Belgian Data Protection Authority Publishes Recommendation Concerning Data Processing for Direct Marketing Purposes

HL Chronicle of Data Protection

The Recommendation provides a methodology on how to comply with the General Data Protection Regulation (GDPR) when conducting direct marketing. How to Comply? The Recommendation provides a step-by-step approach on how achieve compliance: 1. Context and Scope of Application.

article thumbnail

Metadata Management, Data Governance and Automation

erwin

How to automate data mapping. GDPR compliance, for instance, requires a business to discover source-to-target mappings with all accompanying transactions, such as what business rules in the repository are applied to it, to comply with audits. . The Role of Data Automation.

Metadata 102
article thumbnail

Why You Need to Tune EDR to Secure Your Environment

eSecurity Planet

Also read: How to Use MITRE ATT&CK to Understand Attacker Behavior. This will be important not only for maintaining strong security, but also for many compliance requirements that would be met by tracking verified deletion of old data. This matrix will be the basis of customization and what types of alerts to add.

Security 112