BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//hacksw/handcal//NONSGML v1.0//EN
METHOD:PUBLISH
BEGIN:VEVENT
DTSTAMP:20260421T155326Z
DESCRIPTION:Click for Latest Location Information: http://edw2018.dataversi
 ty.net/sessionPop.cfm?confid=121&proposalid=9679\n<p>If your organization h
 asn&rsquo;t already fast-tracked a data access management modernization eff
 ort, chances are that it will. Control over authorized access is an essenti
 al element of GDPR compliance, privacy by design, cross-organization data s
 haring, breach prevention and response, and proactive information security.
  Once the need is established, most organizations start evaluating tools an
 d technologies, and many are available. What they all have in common is the
  need to consume clear, standardized rules that specify WHO gets WHAT acces
 s rights to WHAT data, under WHAT conditions. They all assume business-driv
 en governance over the data, rules, and policies. They depend upon the abil
 ity to translate legal, compliance, risk, and operational needs into techno
 logy requirements. In this session, learn how the leader of a mature Data G
 overnance organization teamed with IT to jumpstart an enterprise-wide Acces
 s Management program. Learn how they:&nbsp;</p>\n\n
 Built a coalition of legal, risk, compliance, privacy, and governance stake
 holders&nbsp;\n	Leveraged architecture and Information security programs\n
 Navigated choices in access management technology stacks&nbsp;\n
 Negotiated budgets, accountabilities, and decision-making&nbsp;\n
 Developed access rules focused on data rather than systems\n\n
DTSTART:20180425T120000
SUMMARY:Leveraging Data Governance to Jumpstart an Access Management Progra
 m
DTEND:20180425T125959
LOCATION: See Description
END:VEVENT
END:VCALENDAR