CCPA vs. GDPR: An Overview on Similarities and Differences

  • LANGUAGE: English DATE: Tuesday, February 12, 2019 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Upcoming Webinars
CCPA vs. GDPR: An Overview on Similarities and Differences

Over the last few years, the world has witnessed an increasing number of data breaches involving the credentials and PII of employees, citizens, and consumers. We've all experienced breach fatigue and/or been impacted by these losses.

As a result of these breaches and the perceived general mismanagement of personal information, some governments have been working to improve the regulatory landscape regarding the privacy of personal data. In May of 2018, GDPR took effect in the EU. Most vendors of identity and security technologies worked diligently to ensure that their products and services could help their customers meet GDPR objectives. Many consumer-facing companies in the EU have made significant changes to the way they do business, particularly with how they collect information (with user consent) and how they use it. Now that GDPR is in place and complaints have been filed, the world waits to see the outcome.

In the US, California made similar moves to protect the data privacy of their citizens with the CCPA, signed in 2018 and will take effect in 2020. The preparations that companies and organizations made for GDPR can provide some lessons learned for others in advance of CCPA.

In this webinar, we will discuss both GDPR and CCPA, what works, what to be worried about, and what to do to protect the data of citizens and consumers.


Speakers

Background: John Tolbert is a Lead Analyst and Managing Director of KuppingerCole, Inc (US). As Lead Analyst, John covers a number of different research areas, outlined below. John also advises cybersecurity and IAM vendors, from startups to Fortune 500 companies, regarding their product and...

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Zero Trust Through Dynamic Authorization and Policy Driven Access

As workers become more mobile and workloads move into the cloud, the traditional model of enforcing security at the network perimeter becomes ineffective. A Zero Trust model of strict access control for every user or device protects your organization from advanced security threats enabling you to stay connected, productive and secure.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00