Loading...
You are here:  Home  >  Conference and Webinar Communities  >  Current Article

RWDG Webinar: Using Data Governance to Protect Sensitive Data

By   /  May 21, 2018  /  No Comments

To view just the slides from this recording, click HERE>>

Logo for Real-World Data Governance Webinar Series from DATAVERSITY and Bob Seiner

About the Webinar

Many Data Governance programs start out by focusing on the protection of sensitive data. Improvements in protection of data require that people are held formally accountable for following the rules associated with appropriate handling of sensitive data. Communications and awareness of data classification and data handling processes become the focus of keeping data private.

In this month’s installment of the Real-World Data Governance webinar series, Bob Seiner will speak about how to focus your data governance program on protecting sensitive data. Bob will talk about the data governance roles and processes required to classify data and enforce the rules associated with protecting sensitive data. It may be less complicated than you think.

In the webinar Bob will discuss:

  • Tips and techniques for classifying data and defining data handling rules
  • Delivering roles appropriate for protecting sensitive data
  • Selecting appropriate data sharing processes to govern
  • Incremental implementation to protect the entire organization
  • Measuring protection to demonstrate governance performance

About the Speaker

Robert S. Seiner

President and Principal, KIK Consulting and Educational Services

Bob Seiner WEB-7Robert S. Seiner is the President and Principal of KIK Consulting & Educational Services and the Publisher of The Data Administration Newsletter (TDAN.com). Bob was recently awarded the DAMA Professional Award for significant and demonstrable contributions to the data management industry. Bob specializes in “non-invasive data governance”, data stewardship, and meta-data management solutions.

This presentation is brought to you in partnership with:

 and 

You might also like...

Data Governance and Serverless Computing

Read More →
We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept