ESM Webinar - tips and tricks
Time & Location
About the Event
This event will focus on how to model information assets and to classify information in terms of personal/sensitive data as well as in terms of CIA(T).
The classification of information assets in terms of personal/sensitive data will enable an efficient treatment registry, which is required from GDPR article 30. As ESM also maintains a registry of Business Applications and Suppliers this will let the ESM user to connect security reauirements and supplier controls in an effective way.
Similarly, classification of information assets in the well known CIA(T), confidentiality, integrity, availability and traceability, will let a CISO to work with an information security architecture that connects to Business Applications, Suppliers etc.
Existing customers will be prioritised.