BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//hacksw/handcal//NONSGML v1.0//EN
METHOD:PUBLISH
BEGIN:VEVENT
DTSTAMP:20260411T235803Z
DESCRIPTION:Click for Latest Location Information: http://edw2022.dataversi
 ty.net/sessionPop.cfm?confid=129&proposalid=13448\nYour systems, data, and 
 information assets need to be protected. Access controls are essential, and
  as a manager, you&rsquo;re expected to know whether yours are strong enoug
 h, in compliance, and have been implemented during your projects. The probl
 em? Access is implemented via a multi-link chain of controls. Each one is i
 ts own specialty, with a unique vocabulary, set of objectives, and implemen
 tation focus. Responsibilities tend to be spread throughout IT and security
  functions; sometimes implementation is treated like an afterthought, a bla
 ck box, or something you&rsquo;re just supposed to trust. This session prov
 ides a non-technical primer, with just enough information for you to unders
 tand the typical links in an access chain of controls, how to present your 
 requirements, and how to know whether your project is getting what it needs
 . Attendees will learn:\n\n
 The key components of the access chain-of-controls\n
 Which ones are managed continuously, and which need to be specified during 
 your projects\n
 A Plain-English approach to setting out access requirements\n
 What access-related tasks to include in your project plans and completion c
 hecklists\n
 How to communicate with your technical counterparts that need to execute&nb
 sp;those tasks\n\n
DTSTART:20220323T120000
SUMMARY:Access 101 for Governance, Privacy, and Data Managers
DTEND:20220323T125959
LOCATION: See Description
END:VEVENT
END:VCALENDAR