erwin Partner Sandhill Consultants is delivering a 3-part webinar on GDPR.
In the final part 3 of this 3-part webinar series, they will outline the linkage from the Systems Architecture (Data + Process) to the Technology Architecture (Network + Security) that are the framework for Enterprise Governance of Personally Identifiable and Sensitive information.
Learn how organizations can reduce the risk of noncompliance by assisting with the automation of the classification and processing of Personally Identifiable and Sensitive Information. It is not just about ensuring data security, it is about the detection and mitigation of potential violations of the regulations. Ultimately it is traceability, and the appropriate level of data governance that will support compliance with the GDPR.
During the 3-part series they will demonstrate a concurrent engineering approach to both data and process modeling that allows for top down and bottom up views. Using the erwin data platform, we will illustrate traceability between the data (what) and application (how) architectures. To complete the enterprise architecture picture, we will also show the association of these systems to the security (who) and network (where) operating models. Notification of data breaches to the relevant authority, and in some cases to the individuals affected will become as important as understanding the scope of the issues.
Part 2 – Migration – Enterprise Governance (Network & Security Architecture)
- Know who and where Data is accessed to notify of breaches of the GDPR to comply with the GDPR
- Network Arhitecture – Identify locations of the “golden” record and the systems that process data that fall under the GDPR mandate.
- Data Distribution – Identify all the points in the network where the data has been distrubted
- Internally for backup, recovery and removal of personal data
- Externally to ensure the data processors (acts on the controller’s behalf) are in compliance with the GDPR
- Security Architecture – Identify which parties have access to applications and are affected by breaches
To complete the enterprise architecture picture, we will also show the association of these systems to the security (who) and network (where) operating models. Notification of data breaches to the relevant authority, and in some cases to the individuals affected will become as important as understanding the scope of the issues.
*** Register now and attend all 3 webcasts to be entered by Sandhill Consultants into a sweepstakes to win a new Golf Driver. ***