Addressing Digital Risk: Aligning Privacy and IT Risk to Combat Cyber Threats

This webinar will take place on:
March 24, 2021
11:00 AM - 12:00 PM EST

Throughout the “digital evolution,” line of business solutions and processes have taken off with higher efficiencies than legacy GRC applications can keep pace. The wave of personal identifiable information (PII) and privacy regulations (GDPR, CCPA, etc.) have forced businesses to rethink how and what information they store and track across their enterprise.

While privacy management touches almost all of the traditional disciplines for GRC initiatives, it’s often tracked a separate compliance exercise. How can you broaden the concept of privacy-by-design to identify and track the appropriate context of risk in everyday activities and understand the business value and potential impact if realized?  

In this webinar, we discuss how you can optimize your data inventories with thoughtful classification to streamline risk and compliance efforts on a broader scale. 

Attend this webinar to:

  • Identify technology and processing methods to update data in real-time
  • Categorize data elements across risk and control inventories for multi-dimensional risk reporting
  • Understand how privacy-focused data minimization can help you decrease your overall attack surface
  • Learn how to engage your line of business stakeholders to guide and collaborate with risk managers to remediate risk at the source


Nick Pavlichek
Lead Product Manager

Nick Pavlichek is the Product Manager for OneTrust GRC– a purpose-built software designed to operationalize integrated risk management. In his role, Pavlichek is responsible for driving the development and delivery OneTrust GRC’s product line, as well as driving the refinement of the toolset and offerings.  He takes a customer-based approach to product development and derives the majority of his backlog from customer feedback and direction. Pavlichek also works with clients to realize the extent of their risk exposure, helping clients to map their digital infrastructure, assess risks, combat threats, monitor ongoing performance, and document evidence throughout the risk lifecycle.

Sponsored By: