VIDEO

Decryption and Inspection and the Steps Needed for Privacy Compliance

Published

Contributors:

Dave Cohen

CIPP/E, CIPP/US

Director

Myna Partners

Ilias Chantzos

Global Privacy Officer, Head of EMEA Government Affairs

Broadcom

Join us for this privacy education web conference to hear an overview of the threat landscape and how attackers use encryption to their benefit, why the inspection of network traffic is necessary for privacy compliance, key considerations for implementing decryption and the strong controls for secure processing of data and the benefits of applying a centralized decryption solution with granular policy enforcement.

Decryption and Inspection and the Steps Needed for Privacy Compliance

View upcoming IAPP web conferences
CPE credit badge

This content is eligible for Continuing Professional Education credits. Please self-submit according to CPE policy guidelines.

Submit for CPEs

Contributors:

Dave Cohen

CIPP/E, CIPP/US

Director

Myna Partners

Ilias Chantzos

Global Privacy Officer, Head of EMEA Government Affairs

Broadcom

Tags:

Data securityLaw and regulationSurveillanceCybersecurity law

Related resources