The Foundation for GDPR Compliance and PI/PII Protection: Understand Where Data Resides and Who Processes It

  • LANGUAGE: English DATE: Tuesday, April 02, 2019 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars
The Foundation for GDPR Compliance and PI/PII Protection: Understand Where Data Resides and Who Processes It

The EU GDPR requires covered organizations to be able to account for and document how personal data is collected, processed and shared. What many companies often fail to realize is that this data is not only stored in specialized and appropriately secured silos such as databases. In fact, the vast majority of their business information is in unstructured and semi-structured formats, distributed across multiple systems an services. Without consistent visibility into whose data is processed across these environments, organizations cannot adequately account for how personal data is processed - as well as lose the context they need to identify security and compliance issues such as excessive privileges. To both address the compliance need for accountability and the security need for visibility, a new approach to data understanding is needed.

Records of Processing Activity (RoPAs or GDPR Article 30) documentation of data flows is a key compliance requirement. The challenge that many organizations face is that their current approach based on surveying stakeholders is time-consuming, manual and impressionistic at best. Because the output is also divorced from the data, enterprises that are required to produce documentation for regulators and auditors are constantly playing catch up - and cannot transition to a 'continuous compliance' model as prescribed under the EU GDPR. 

By contrast, a data-driven approach can automate the building and maintenance of processing activity reports based on machine insights that incorporate human input, ensuring record keeping accuracy while simplifying collaborative business context augmentation. This approach offers benefits in terms of automation, but also provides a path to privacy assurance - and a systematic approach to the GDPR principle of accountability for both internal stakeholders as well as auditors and regulators. 

Join this webinar to learn more about:

  • Why RoPAs are critical to compliance
  • How to better automate the process through integration of business stakeholder input and data-driven insights
  • Detecting unstructured data in your IT systems and identifying data owners
  • Application of uniform governance guidelines in heterogeneous IT landscapes
  • Automate security and compliance controls to ensure real-time problem resolution

In the first part of the webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will talk about the need for getting a grip on PI/PII, beyond GDPR. Data Governance and Continuous Compliance must become an integral element of the IT Risk Management and IT Security Architecture.

In the second part, Nimrod Vax, Chief Product Officer at BigID, will speak about the capabilities to automate data processing reports, how they fit into a continuous compliance model with services and technology partners, and the concept or privacy assurance.


Nimrod has over 15 years of experience in enterprise security software and identity management serving in various capacities ranging from engineering, product and business management. Prior to founding BigID, Nimrod served as VP Product Management, Product Line Manager for CA Identity Management...

Lead Sponsor

BigID aims to transform how enterprise protect and manage the privacy of personal data. Organizations are facing record breaches of personal information and proliferating global privacy regulations like the EU GDPR with fines reaching 4% of annual revenue.

Today enterprises lack dedicated purpose built technology to help them track and govern their customer data at scale. By bringing data science to data privacy, BigID aims to give enterprises the software to safeguard and steward the most important asset organizations manage: their customer data.

Watch now


Trending Videos

Next Webinar


Breaking the Ransomware Attack Chain

At some point, any business connected to the internet is likely to become a victim of a ransomware because they are relatively easy and inexpensive to carry out, but potentially yield large payouts for cybercriminals. The best way of tackling this threat is to know how to break the attack chain.

Become a Sponsor


+49 211 23707710
Mo – Fr 8:00 – 17:00