Decryption and Inspection and the Steps Needed for Privacy Compliance

Resource Center / Web Conferences / Decryption and Inspection and the Steps Needed for Privacy Compliance

Decryption and Inspection and the Steps Needed for Privacy Compliance


Original broadcast date: March 2021


Join us for this privacy education web conference to hear an overview of the threat landscape and how attackers use encryption to their benefit, why the inspection of network traffic is necessary for privacy compliance, key considerations for implementing decryption and the strong controls for secure processing of data and the benefits of applying a centralized decryption solution with granular policy enforcement.

On-demand recordings of IAPP web conferences are available shortly after the live broadcast concludes. You will still need to register for the web conference through the link above, after which the on-demand recording will then become accessible within your MyIAPP profile. Once in your profile, go to the My Purchases section, where the on-demand recording will be listed within the My Recordings subsection.

All IAPP web conferences can be accessed here.



Approved
CDPO, CDPO/BR, CDPO/FR, CIPM, CIPP/A, CIPP/C, CIPP/E, CIPP/G, CIPP/US, CIPT, LGPD
Credits: 1

Submit for CPEs