BEGIN:VCALENDAR VERSION:2.0 PRODID:-//B2E Consulting - ECPv6.6.4.2//NONSGML v1.0//EN CALSCALE:GREGORIAN METHOD:PUBLISH X-WR-CALNAME:B2E Consulting X-ORIGINAL-URL:https://www.b2econsulting.com X-WR-CALDESC:Events for B2E Consulting REFRESH-INTERVAL;VALUE=DURATION:PT1H X-Robots-Tag:noindex X-PUBLISHED-TTL:PT1H BEGIN:VTIMEZONE TZID:Europe/London BEGIN:DAYLIGHT TZOFFSETFROM:+0000 TZOFFSETTO:+0100 TZNAME:BST DTSTART:20210328T010000 END:DAYLIGHT BEGIN:STANDARD TZOFFSETFROM:+0100 TZOFFSETTO:+0000 TZNAME:GMT DTSTART:20211031T010000 END:STANDARD END:VTIMEZONE BEGIN:VEVENT DTSTART;TZID=Europe/London:20210519T123000 DTEND;TZID=Europe/London:20210519T133000 DTSTAMP:20250419T072901 CREATED:20210504T055246Z LAST-MODIFIED:20210504T055246Z UID:10084-1621427400-1621431000@www.b2econsulting.com SUMMARY:Shadow IT: The Enemy At The Gates DESCRIPTION:How what looks like just a marginal IT issue\, can have serious unintended consequences.\n\n\nSHADOW IT – THE ENEMY AT THE GATES \n \nWith Giampiero Nanni. \n“Shadow IT” refers to the apps in the cloud\, used or downloaded by employees of an organisation\, without the knowledge of their IT Department.\n \nIn this scenario\, narrated as a chronicle and commented with practical recommendations\, what looks like just a marginal IT issue\, hides a concerning lack of governance of personal data\, compliance\, and cybersecurity.\n \nIn today’s hyper-regulated world\, and with a fast-evolving cyber-threat landscape\, privacy compliance and cybersecurity must be front and centre of every business strategy.\n \n \n Sign Up Now! \n12.30-1.30pm \nWe will be using Zoom to run this webinar. You will receive instructions on how to join – including meeting details – in the confirmation email sent to you after you have booked your space. \n————————- \nAbout Giampiero: \nGiampiero is a certified data protection (IAPP CIPP/E\, CIPM) and cybersecurity professional with significant customer consultancy and regulatory advocacy experience. Also an IAPP Certified Privacy Trainer. \nHe was until recently a privacy and security consultant at a global external DPO Service practice. \nIn a recent engagement at the ITU (a UN Agency) he was responsible for the production of the cybersecurity and risk management policy document for the 2020 G20 hosted by Saudi Arabia. \nPrior to that\, he was at Symantec in the Government Affairs EMEA team\, engaging with legislators and regulators\, as well as with customers about the legislative characteristics of the GDPR\, the business value of privacy compliance and the way organisations can implement the regulatory mandate through privacy and cybersecurity technological choices. He was also involved with internal privacy operations in the Global Privacy Office. \nA regular public speaker about cybersecurity and privacy\, he is an author of publications and articles on regulatory compliance. \nPrevious appointments include Andersen Consulting (now Accenture)\, IBM Global Services\, Microsoft\, Cisco. URL:https://www.b2econsulting.com/event/shadow-it-the-enemy-at-the-gates/ ATTACH;FMTTYPE=image/jpeg:https://www.b2econsulting.com/wp-content/uploads/2023/04/shutterstock_635182943-Finance-Transformation-Case-Studies.jpg END:VEVENT END:VCALENDAR