VIDEO
Decryption and Inspection and the Steps Needed for Privacy Compliance


Published
Contributors:
Dave Cohen
CIPP/E, CIPP/US
Director
Myna Partners
Ilias Chantzos
Global Privacy Officer, Head of EMEA Government Affairs
Broadcom
Join us for this privacy education web conference to hear an overview of the threat landscape and how attackers use encryption to their benefit, why the inspection of network traffic is necessary for privacy compliance, key considerations for implementing decryption and the strong controls for secure processing of data and the benefits of applying a centralized decryption solution with granular policy enforcement.
Decryption and Inspection and the Steps Needed for Privacy Compliance

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.
Submit for CPEsContributors:
Dave Cohen
CIPP/E, CIPP/US
Director
Myna Partners
Ilias Chantzos
Global Privacy Officer, Head of EMEA Government Affairs
Broadcom