BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//HasGeek//NONSGML Funnel//EN
DESCRIPTION:Experiential discussions on engineering for security\, complia
 nce and privacy
X-WR-CALDESC:Experiential discussions on engineering for security\, compli
 ance and privacy
NAME:Data Governance Meetups
X-WR-CALNAME:Data Governance Meetups
REFRESH-INTERVAL;VALUE=DURATION:PT12H
SUMMARY:Data Governance Meetups
TIMEZONE-ID:Asia/Kolkata
X-PUBLISHED-TTL:PT12H
X-WR-TIMEZONE:Asia/Kolkata
BEGIN:VEVENT
SUMMARY:Introduction to the meetup\; setting expectations
DTSTART:20200704T103000Z
DTEND:20200704T103500Z
DTSTAMP:20260421T132339Z
UID:session/XXijSiZK2chKAJJvdk5hS2@hasgeek.com
SEQUENCE:0
CREATED:20200607T172401Z
DESCRIPTION:\n
LAST-MODIFIED:20200607T172401Z
LOCATION:Online
ORGANIZER;CN="The Fifth Elephant":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Introduction to the meetup\; setting expectations in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Data Governance 101
DTSTART:20200704T103500Z
DTEND:20200704T110500Z
DTSTAMP:20260421T132339Z
UID:session/T4eY1oQrgrG9bwMcViDCJw@hasgeek.com
SEQUENCE:2
CATEGORIES:Full talk - 40 mins
CREATED:20200628T083939Z
DESCRIPTION:* What is Data Governance?\n* Why is Data Governance hard?\n  
   * There is too much data.\n    * There is too much complexity.\n    * Th
 ere is no context for data usage.\n* Automation examples to ease data gove
 rnance.\n    * Where is my data?\n    * Who has access to data?\n    * How
  is the data used?\n * Conclusion\n\n### Speaker bio\n\nRajat Venkatesh ha
 s experience in building data warehouses and data lakes used by the larges
 t companies in the world. He has helped data-driven companies adopt data g
 overnance processes to solve their security & privacy goals. He created a 
 set of open source data governance tools (https://tokern.io/) to help othe
 r data teams with similar challenges.\n
LAST-MODIFIED:20230810T072606Z
LOCATION:Online
ORGANIZER;CN="The Fifth Elephant":MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/fifthelephant/data-governance-meetups/schedule/dat
 a-governance-101-T4eY1oQrgrG9bwMcViDCJw
BEGIN:VALARM
ACTION:display
DESCRIPTION:Data Governance 101 in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Q&A session
DTSTART:20200704T110500Z
DTEND:20200704T111500Z
DTSTAMP:20260421T132339Z
UID:session/Hcwvn2GGrBMQaciKJDxJ7E@hasgeek.com
SEQUENCE:0
CREATED:20200607T172429Z
DESCRIPTION:\n
LAST-MODIFIED:20200702T091405Z
LOCATION:Online
ORGANIZER;CN="The Fifth Elephant":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Q&A session in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Birds Of Feather (BOF) session: on the business/organizational con
 text for engineering for compliance and data governance
DTSTART:20200704T111500Z
DTEND:20200704T115500Z
DTSTAMP:20260421T132339Z
UID:session/CC1kCbZoiLEykiPfaGq1oy@hasgeek.com
SEQUENCE:1
CREATED:20200702T091529Z
DESCRIPTION:The main takeaways from this session were:\n1. Data Compliance
 \, Privacy & Security is a journey\n2. Data governance is hard because:\n3
 . There is too much data.\n4. There is too much complexity in data infrast
 ructure systems.\n5. There is not enough context on data usage.\n\nStart w
 ith simple questions such as:\n1. Where is sensitive data?\n2. Who has acc
 ess to data?\n3. How is the data used?\n\nAutomate data governance tasks w
 ith the following tools:\n1. PIICatcher & Data Lineage for cataloging data
  sets.\n2. Analyze access to datasets in AWS Glue Catalog.\n3. Storing Sno
 wflake or AWS Redshift query history for detecting behavioral patterns.\n4
 . ProxySQL (MySQL) and pgPool (Postgres) to capture query history on produ
 ction databases.\n\nDiscussion topics in the BoF session included:\n1. How
  do you assign a dollar amount to the cost & benefit of data governance?\n
 2. Challenges in supporting “Right To Delete”.\n3. Challenges in Data 
 Classification considering differences in locales.\n4. Cultural norms in c
 lassifying data.\n
LAST-MODIFIED:20230108T103046Z
LOCATION:Online
ORGANIZER;CN="The Fifth Elephant":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Birds Of Feather (BOF) session: on the business/organizational
  context for engineering for compliance and data governance in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Summary and closing
DTSTART:20200704T115500Z
DTEND:20200704T120000Z
DTSTAMP:20260421T132339Z
UID:session/A7fWNqMmC7twKkXQhvChEs@hasgeek.com
SEQUENCE:0
CREATED:20200702T091955Z
DESCRIPTION:\n
LAST-MODIFIED:20200702T091955Z
LOCATION:Online
ORGANIZER;CN="The Fifth Elephant":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Summary and closing in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Introduction to data governance meetups
DTSTART:20200801T104500Z
DTEND:20200801T105000Z
DTSTAMP:20260421T132339Z
UID:session/PBFMBa34kYJ3Rx5Eaq6SRt@hasgeek.com
SEQUENCE:0
CREATED:20200721T044739Z
DESCRIPTION:\n
LAST-MODIFIED:20200729T113343Z
LOCATION:Online
ORGANIZER;CN="The Fifth Elephant":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Introduction to data governance meetups in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Unstructured data and agile processes for implementing privacy con
 trols
DTSTART:20200801T105000Z
DTEND:20200801T113000Z
DTSTAMP:20260421T132339Z
UID:session/2fC7XTRuwqKUwA4rZ6fheQ@hasgeek.com
SEQUENCE:2
CATEGORIES:Full talk - 40 mins
CREATED:20200722T085801Z
DESCRIPTION:* Problem Statement\n* Data Governance Policy Skeleton\n* Proc
 ess flows that enable uniform data governance.\n* Technical controls that 
 validate privacy by design.\n\nLink to the presentation is: https://speake
 rdeck.com/toufiq/data-governance-in-the-world-privacy\n\n### Speaker bio\n
 \nI am security professional with over a decade of experience in offensive
  security practices like vulnerability discovery\, vulnerability exploitat
 ion\, penetration testing\, application security\, red teaming\, and cloud
  security. He is also experienced in a number of defensive practices such 
 as vulnerability management\, \,implementing secure coding practices\, thr
 eat modeling\, security architecture\, blue teaming\, DevSecOps\, and desi
 gning security in systems grounds up.\n
LAST-MODIFIED:20230810T072606Z
LOCATION:Online
ORGANIZER;CN="The Fifth Elephant":MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/fifthelephant/data-governance-meetups/schedule/dat
 a-governance-at-contoso-inc-2fC7XTRuwqKUwA4rZ6fheQ
BEGIN:VALARM
ACTION:display
DESCRIPTION:Unstructured data and agile processes for implementing privacy
  controls in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Q&A session
DTSTART:20200801T113000Z
DTEND:20200801T114000Z
DTSTAMP:20260421T132339Z
UID:session/7B7CrWCxys75ZQczhVKAg3@hasgeek.com
SEQUENCE:0
CREATED:20200721T045018Z
DESCRIPTION:\n
LAST-MODIFIED:20200729T113359Z
LOCATION:Online
ORGANIZER;CN="The Fifth Elephant":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Q&A session in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Birds of Feather (BOF) session: Implementing Privacy by Design - p
 ractical challenges and concerns
DTSTART:20200801T114000Z
DTEND:20200801T122000Z
DTSTAMP:20260421T132339Z
UID:session/QVpGCfwmHAMTP2jfMGaTfZ@hasgeek.com
SEQUENCE:0
CREATED:20200721T045101Z
DESCRIPTION:\n
LAST-MODIFIED:20200819T105141Z
LOCATION:Online
ORGANIZER;CN="The Fifth Elephant":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Birds of Feather (BOF) session: Implementing Privacy by Design
  - practical challenges and concerns in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Introduction to data governance meetups
DTSTART:20200905T103000Z
DTEND:20200905T103500Z
DTSTAMP:20260421T132339Z
UID:session/KnpCFaRgtHQfrYe3DZgBSL@hasgeek.com
SEQUENCE:0
CREATED:20200721T045209Z
DESCRIPTION:\n
LAST-MODIFIED:20200721T045209Z
LOCATION:Online
ORGANIZER;CN="The Fifth Elephant":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Introduction to data governance meetups in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:How Zeotap became GDPR compliant
DTSTART:20200905T103500Z
DTEND:20200905T110500Z
DTSTAMP:20260421T132339Z
UID:session/GkVy57JMs38hJHScZqmbSf@hasgeek.com
SEQUENCE:2
CREATED:20200721T045218Z
DESCRIPTION:Link to the slides: https://drive.google.com/file/d/1OXyFoy3WS
 y_JcvwkG7jpkEcJVOfV4U6k/view?usp=sharing\n\n### Speaker bio\n\nhttps://www
 .linkedin.com/in/sathishks/\n
LAST-MODIFIED:20230810T072606Z
LOCATION:Online
ORGANIZER;CN="The Fifth Elephant":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:How Zeotap became GDPR compliant in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Q&A session
DTSTART:20200905T110500Z
DTEND:20200905T111500Z
DTSTAMP:20260421T132339Z
UID:session/Y6vkuSpLvvmULz9RxrUc72@hasgeek.com
SEQUENCE:0
CREATED:20200721T045229Z
DESCRIPTION:\n
LAST-MODIFIED:20200721T045231Z
LOCATION:Online
ORGANIZER;CN="The Fifth Elephant":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Q&A session in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:PDP Checklist for tech products
DTSTART:20200905T111500Z
DTEND:20200905T112500Z
DTSTAMP:20260421T132339Z
UID:session/86xuFsAq94bFxeLH9PJZgd@hasgeek.com
SEQUENCE:2
CATEGORIES:Crisp talk/demo - 20 mins
CREATED:20200825T041031Z
DESCRIPTION:5-min Quick overview of the PDP checklist that Scribble Data h
 as developed. This is a project for everyone to contribute to.\n\n### Spea
 ker bio\n\nCo-Founder at Scribble Data\, a ML Feature Store firm.\n
LAST-MODIFIED:20230810T072606Z
LOCATION:Online
ORGANIZER;CN="The Fifth Elephant":MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/fifthelephant/data-governance-meetups/schedule/pdp
 -checklist-opensource-project-86xuFsAq94bFxeLH9PJZgd
BEGIN:VALARM
ACTION:display
DESCRIPTION:PDP Checklist for tech products in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Birds of Feather (BOF) session: Building resources and voice colle
 ctively to work with emerging data regulation regime
DTSTART:20200905T112500Z
DTEND:20200905T120000Z
DTSTAMP:20260421T132339Z
UID:session/KxM7nyTnZFUKPcDsXQyot2@hasgeek.com
SEQUENCE:0
CREATED:20200825T041225Z
DESCRIPTION:\n
LAST-MODIFIED:20200924T023737Z
LOCATION:Online
ORGANIZER;CN="The Fifth Elephant":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Birds of Feather (BOF) session: Building resources and voice c
 ollectively to work with emerging data regulation regime in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Summary\; poll for next month's topic
DTSTART:20200905T120000Z
DTEND:20200905T120500Z
DTSTAMP:20260421T132339Z
UID:session/TCxcyXcgzJvmZpuynLJ6Bw@hasgeek.com
SEQUENCE:0
CREATED:20200721T045341Z
DESCRIPTION:\n
LAST-MODIFIED:20200721T045341Z
LOCATION:Online
ORGANIZER;CN="The Fifth Elephant":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Summary\; poll for next month's topic in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Introduction to data governance meetups
DTSTART:20201010T103000Z
DTEND:20201010T103500Z
DTSTAMP:20260421T132339Z
UID:session/rfNkGB5ozXwExxzzo3UVZ@hasgeek.com
SEQUENCE:0
CREATED:20200721T045435Z
DESCRIPTION:\n
LAST-MODIFIED:20200922T133220Z
LOCATION:Online
ORGANIZER;CN="The Fifth Elephant":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Introduction to data governance meetups in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Data Catalog options and lessons learned trying to do it right
DTSTART:20201010T103500Z
DTEND:20201010T112000Z
DTSTAMP:20260421T132339Z
UID:session/M9sN32KGsJBS4yKB57Fdyw@hasgeek.com
SEQUENCE:2
CATEGORIES:Full talk - 40 mins
CREATED:20200924T021646Z
DESCRIPTION:Data Catalog First principles \, talk about features such as-:
 \nData Dictionary\nLineage\nBusiness Glossary\nData SLAs\nOwnership and Da
 ta modelling\nSearch and Exploration\nTagging and Compliance\nData feeds a
 nd Democratization\n\n\nKey OSS catalogs and a brief overview/comparisons\
 nAmundsen vs Atlas vs Datahub vs Marquez\, how do they compare on the abov
 e\n\nWhich features should you go for as an org?\nDiscovery vs. Curation\n
 Security vs democratization\nCompliance and Productivity\n\nLessons learn 
 (If time remaining)\n\n### Speaker bio\n\nBig data consultant with more th
 an 5 years of experience solutioning and engineering for large scale data 
 platforms and systems. Have a total of 9 years of experience working in mu
 ltiple domains including but not limited to building distributed systems u
 sing scala\, devops and cloud native tech\, blockchain with interests in I
 oT and Security.\n
LAST-MODIFIED:20230810T072606Z
LOCATION:Online
ORGANIZER;CN="The Fifth Elephant":MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/fifthelephant/data-governance-meetups/schedule/dat
 a-governance-data-catalog-options-and-lessons-learned-trying-to-do-it-righ
 t-M9sN32KGsJBS4yKB57Fdyw
BEGIN:VALARM
ACTION:display
DESCRIPTION:Data Catalog options and lessons learned trying to do it right
  in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Q&A session
DTSTART:20201010T112000Z
DTEND:20201010T113000Z
DTSTAMP:20260421T132339Z
UID:session/GL1Vy2aL8MzWvhj6KhhB1E@hasgeek.com
SEQUENCE:0
CREATED:20200721T045452Z
DESCRIPTION:\n
LAST-MODIFIED:20200924T021652Z
LOCATION:Online
ORGANIZER;CN="The Fifth Elephant":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Q&A session in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:End-to-end encryption for email attachments
DTSTART:20201010T113000Z
DTEND:20201010T115000Z
DTSTAMP:20260421T132339Z
UID:session/NVkSfggS6Py9TZXHKPbfAz@hasgeek.com
SEQUENCE:2
CATEGORIES:Crisp talk/demo - 20 mins
CREATED:20201006T001829Z
DESCRIPTION:In its current avatar\, **[Skizzle](https://skizzle.email)** i
 s a browser extension that allows you to send/receive end-to-end encrypted
  attachments right in your Gmail. All user actions are written to a public
  blockchain which allows them to publicly verify their account usage and t
 he state of their files(who has access)\, at any time.\nWith a focus on da
 ta security and being privacy preserving\, Skizzle intends to create a sui
 te of products for various platforms that allows all kinds of users(indivi
 duals\, small or big businesses/institutions) to plug E2EE of files and da
 ta into their normal workflow when using their favorite email or chat clie
 nts.\nWe also intend to expand into a secure storage and data sharing plat
 form where developers can plug our SDKs into their apps and offer a variet
 y  of E2EE use cases to their users\, right out of the box.\n\n#### Talk S
 equence:\n1. Introduction to Skizzle\n2. How does Skizzle do E2EE\n3. How 
 is Skizzle privacy preserving\n4. How is Skizzle transparent\n5. What the 
 future looks like for Skizzle\n\n### Speaker bio\n\nMayur Relekar\nFounder
  https://skizzle.email\nFounder https://newfang.io\nhttps://www.linkedin.c
 om/in/mayurrelekar\nhttps://twitter.com/mayurrelekar\n
LAST-MODIFIED:20230810T072606Z
LOCATION:Online
ORGANIZER;CN="The Fifth Elephant":MAILTO:no-reply@hasgeek.com
URL:https://hasgeek.com/fifthelephant/data-governance-meetups/schedule/how
 -we-do-end-to-end-encryption-at-https-skizzle-email-NVkSfggS6Py9TZXHKPbfAz
BEGIN:VALARM
ACTION:display
DESCRIPTION:End-to-end encryption for email attachments in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
BEGIN:VEVENT
SUMMARY:Birds of Feather (BoF) session: On security and centralized data g
 overnance
DTSTART:20201010T115000Z
DTEND:20201010T122000Z
DTSTAMP:20260421T132339Z
UID:session/GgUnzFkQMUoyNFUGUkCjgV@hasgeek.com
SEQUENCE:0
CREATED:20200721T045503Z
DESCRIPTION:\n
LAST-MODIFIED:20201010T022521Z
LOCATION:Online
ORGANIZER;CN="The Fifth Elephant":MAILTO:no-reply@hasgeek.com
BEGIN:VALARM
ACTION:display
DESCRIPTION:Birds of Feather (BoF) session: On security and centralized da
 ta governance in 5 minutes
TRIGGER:-PT5M
END:VALARM
END:VEVENT
END:VCALENDAR
