BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//HasGeek//NONSGML Funnel//EN
DESCRIPTION:A compendium
X-WR-CALDESC:A compendium
NAME:Privacy Best Practices Guide
X-WR-CALNAME:Privacy Best Practices Guide
REFRESH-INTERVAL;VALUE=DURATION:PT12H
SUMMARY:Privacy Best Practices Guide
TIMEZONE-ID:Asia/Kolkata
X-PUBLISHED-TTL:PT12H
X-WR-TIMEZONE:Asia/Kolkata
BEGIN:VEVENT
SUMMARY:Masking sensitive data with Logstash
DTSTART:20220517T103000Z
DTEND:20220517T111000Z
DTSTAMP:20260421T095905Z
UID:session/VYYJsePipCgNRf9bttbpgY@hasgeek.com
SEQUENCE:11
CREATED:20220425T051024Z
DESCRIPTION:https://hasgeek.com/PrivacyMode/bpg/sub/best-practices-guide-m
 asking-sensitive-data-in-log-QnGqpPnqKUiDSAJ1PukwMd
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN="Privacy Mode":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Masking sensitive data with Logstash in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Data Encryption and Masking
DTSTART:20220517T111000Z
DTEND:20220517T112000Z
DTSTAMP:20260421T095905Z
UID:session/12MLoE5PhcZF5pUEAsk3fD@hasgeek.com
SEQUENCE:2
CREATED:20220603T051350Z
LAST-MODIFIED:20220603T051416Z
LOCATION:Online
ORGANIZER;CN="Privacy Mode":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Data Encryption and Masking in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:User Data Anonymization at LinkedIn
DTSTART:20220520T103000Z
DTEND:20220520T110000Z
DTSTAMP:20260421T095905Z
UID:session/EHKw3cAyMDpnngerBsgF9m@hasgeek.com
SEQUENCE:10
CREATED:20220425T124242Z
DESCRIPTION:https://hasgeek.com/PrivacyMode/bpg/sub/best-practices-guide-u
 ser-data-anonymization-and-d-8nHAztPQkhLZhUaEV1TGeM
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN="Privacy Mode":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:User Data Anonymization at LinkedIn in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:User Data Deletion at LinkedIn
DTSTART:20220520T110000Z
DTEND:20220520T113000Z
DTSTAMP:20260421T095905Z
UID:session/Ns2UWu4WjWMX5gYDyUBskx@hasgeek.com
SEQUENCE:5
CREATED:20220425T125403Z
DESCRIPTION:https://hasgeek.com/PrivacyMode/bpg/sub/best-practices-guide-u
 ser-data-anonymization-and-d-8nHAztPQkhLZhUaEV1TGeM
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN="Privacy Mode":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:User Data Deletion at LinkedIn in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:AWS Security Best Practices
DTSTART:20220524T103000Z
DTEND:20220524T110000Z
DTSTAMP:20260421T095905Z
UID:session/V1Sf58T3uCZmUvLH9sAznh@hasgeek.com
SEQUENCE:5
CREATED:20220425T125821Z
DESCRIPTION:https://hasgeek.com/PrivacyMode/bpg/sub/best-practices-guide-a
 ws-security-best-practice-T3Ey4ETMiosf1g9exH6vVu
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN="Privacy Mode":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:AWS Security Best Practices in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Achieving a High Level of Network Inspection with VPC Traffic Mirr
 oring and Suricata
DTSTART:20220524T110000Z
DTEND:20220524T113000Z
DTSTAMP:20260421T095905Z
UID:session/9zt7Wz7zaWbCwhmEAN7dBq@hasgeek.com
SEQUENCE:7
CREATED:20220502T060724Z
DESCRIPTION:COVID has hit everyone and affected people in their own way. A
 s far as organizations are concerned\, employees have been asked to work f
 rom home (WFH)\, and because many industries are now working remotely\, th
 e pattern of user connections to the enterprise network has turned upside 
 down. Instead of most users connecting locally\, now most are connecting r
 emotely. And for allowing employees to access critical business functions\
 , there is mandatory VPN connectivity.\n\nSince the VPN instance is kept i
 n a demilitarized zone (DMZ) to allow employees around the globe to connec
 t to it and access internal applications\, there is an unexpected flood of
  WFH connections\, which makes VPN networks more vulnerable to all kinds o
 f Layer7/Layer3 attacks.\n\nWe will walk through how we have strengthened 
 security and monitoring over our public VPN instance\, which was kept in t
 he public VPC\, keeping an ever-watchful eye out for unusual traffic patte
 rns or content that could signify a network intrusion using AWS VPC Traffi
 c Mirroring and a network intrusion detection system Suricata.\n\nDetails 
 at https://hasgeek.com/rootconf/detecting-anomalous-network-patterns/sub/a
 chieving-a-high-level-of-network-inspection-with-Q2hJVXmBf85hyBopnbZJzm
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN="Privacy Mode":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Achieving a High Level of Network Inspection with VPC Traffic 
 Mirroring and Suricata in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Doing Data Security for Fintech - Challenges at Scale
DTSTART:20220527T103000Z
DTEND:20220527T113000Z
DTSTAMP:20260421T095905Z
UID:session/RmfFRcSt8GP9GvCjHNgkrT@hasgeek.com
SEQUENCE:5
CREATED:20220425T130457Z
LAST-MODIFIED:20220607T080539Z
LOCATION:Online
ORGANIZER;CN="Privacy Mode":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Doing Data Security for Fintech - Challenges at Scale in 5 min
 utes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Automating Data Governance and Compliance
DTSTART:20220531T103000Z
DTEND:20220531T110000Z
DTSTAMP:20260421T095905Z
UID:session/RQUQ5WWQZPB1BQwfLyhv8D@hasgeek.com
SEQUENCE:9
CREATED:20220425T131004Z
DESCRIPTION:https://hasgeek.com/PrivacyMode/bpg/sub/best-practices-guide-d
 ata-governance-101-HYbVb6aUWk91M3aWFm81bt
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN="Privacy Mode":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Automating Data Governance and Compliance in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Guardrails for the Data Economy
DTSTART:20220531T110000Z
DTEND:20220531T113000Z
DTSTAMP:20260421T095905Z
UID:session/bmkb9iGWD4Ysajz6NBcEk@hasgeek.com
SEQUENCE:4
CREATED:20220425T135701Z
DESCRIPTION:https://hasgeek.com/rootconf/privacy-as-risk-assessment-and-ri
 sk-mitigation/sub/guardrails-for-the-data-economy-Ck7gLU9hqDtfj1Q3rP9bjV
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN="Privacy Mode":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Guardrails for the Data Economy in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Unstructured Data and Agile Processes for Implementing Privacy Con
 trols
DTSTART:20220603T103000Z
DTEND:20220603T111000Z
DTSTAMP:20260421T095905Z
UID:session/Vu4EGsPvMZaryimLt4AdJT@hasgeek.com
SEQUENCE:6
CREATED:20220425T140356Z
DESCRIPTION:https://hasgeek.com/PrivacyMode/bpg/sub/best-practices-guide-u
 nstructured-data-and-agile-p-6WAoSpVpjVzm3yK1fKtNEp
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN="Privacy Mode":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Unstructured Data and Agile Processes for Implementing Privacy
  Controls in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Data governance strategies from experience
DTSTART:20220607T103000Z
DTEND:20220607T110500Z
DTSTAMP:20260421T095905Z
UID:session/HGSckd2YPNwqaPi8NeqyoB@hasgeek.com
SEQUENCE:3
CREATED:20220608T164607Z
LAST-MODIFIED:20220608T165057Z
LOCATION:Online
ORGANIZER;CN="Privacy Mode":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Data governance strategies from experience in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Data Mesh
DTSTART:20220607T110500Z
DTEND:20220607T111000Z
DTSTAMP:20260421T095905Z
UID:session/VinP5bs1BvApvErvfb9Aku@hasgeek.com
SEQUENCE:0
CREATED:20220608T164801Z
LAST-MODIFIED:20220608T164801Z
LOCATION:Online
ORGANIZER;CN="Privacy Mode":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Data Mesh in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Data Mesh
DTSTART:20220607T110500Z
DTEND:20220607T113500Z
DTSTAMP:20260421T095905Z
UID:session/TLAtFZwXmmCRSJYLkKGmAx@hasgeek.com
SEQUENCE:3
CREATED:20220608T164801Z
LAST-MODIFIED:20220608T165211Z
LOCATION:Online
ORGANIZER;CN="Privacy Mode":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Data Mesh in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:GDPR Compliance at Intuit
DTSTART:20220610T103000Z
DTEND:20220610T110000Z
DTSTAMP:20260421T095905Z
UID:session/6E4H1L6tmCJry6psM13eCh@hasgeek.com
SEQUENCE:5
CREATED:20220425T150158Z
DESCRIPTION:https://hasgeek.com/PrivacyMode/bpg/sub/best-practices-guide-g
 dpr-compliance-at-intuit-9wRJ21ifbzXfMR4tMKW3qE
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN="Privacy Mode":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:GDPR Compliance at Intuit in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:GDPR Compliance at Zeotap
DTSTART:20220610T110000Z
DTEND:20220610T113000Z
DTSTAMP:20260421T095905Z
UID:session/SxE5Ed2aWqsojN6YGbZ1RF@hasgeek.com
SEQUENCE:5
CREATED:20220425T150340Z
DESCRIPTION:https://hasgeek.com/PrivacyMode/bpg/sub/best-practices-guide-g
 dpr-compliance-at-zeotap-JtfArG9RUw4pD3KSrCgQim
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN="Privacy Mode":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:GDPR Compliance at Zeotap in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Best Practices for Regulatory Compliance at Frappe
DTSTART:20220610T113000Z
DTEND:20220610T120500Z
DTSTAMP:20260421T095905Z
UID:session/6sJvQoZgi1NmZr2HpZofGd@hasgeek.com
SEQUENCE:0
CREATED:20220615T130737Z
LAST-MODIFIED:20220615T130737Z
LOCATION:Online
ORGANIZER;CN="Privacy Mode":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Best Practices for Regulatory Compliance at Frappe in 5 minute
 s
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Best Practices for Regulatory Compliance at Frappe
DTSTART:20220610T113000Z
DTEND:20220610T120500Z
DTSTAMP:20260421T095905Z
UID:session/YH7iCupjmKD2ZzwYFP9CkP@hasgeek.com
SEQUENCE:1
CREATED:20220615T130721Z
LAST-MODIFIED:20220615T130838Z
LOCATION:Online
ORGANIZER;CN="Privacy Mode":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Best Practices for Regulatory Compliance at Frappe in 5 minute
 s
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Impact of Non-Personal Data (NPD) Framework on Engineering Process
 es
DTSTART:20220614T103000Z
DTEND:20220614T111000Z
DTSTAMP:20260421T095905Z
UID:session/HZgXyi82EeFF1k7JZwAjLb@hasgeek.com
SEQUENCE:5
CREATED:20220425T150527Z
DESCRIPTION:https://hasgeek.com/PrivacyMode/impact-of-non-personal-data-np
 d-framework-on-engineering-processes/
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN="Privacy Mode":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Impact of Non-Personal Data (NPD) Framework on Engineering Pro
 cesses in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Lean Data Practices - Principles for Effective Data Governance
DTSTART:20220617T103000Z
DTEND:20220617T111000Z
DTSTAMP:20260421T095905Z
UID:session/VjHaTRNNxD36bgSRnoRdaX@hasgeek.com
SEQUENCE:8
CREATED:20220425T161754Z
DESCRIPTION:https://hasgeek.com/PrivacyMode/bpg/sub/best-practices-guide-l
 ean-data-practices-ArrRcHuhG3E5kYCxz9paZ6
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN="Privacy Mode":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Lean Data Practices - Principles for Effective Data Governance
  in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Implementing Privacy by Design
DTSTART:20220622T130000Z
DTEND:20220622T140000Z
DTSTAMP:20260421T095905Z
UID:session/8tj14cWoHTVC9FCyUhothk@hasgeek.com
SEQUENCE:12
CREATED:20220425T162004Z
DESCRIPTION:https://hasgeek.com/PrivacyMode/bpg/sub/best-practices-guide-i
 mplementing-privacy-by-desig-CM1pebZRJN2M1L8ixUFYsD
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN="Privacy Mode":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Implementing Privacy by Design in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
END:VCALENDAR
