Data has become the currency that is not only valuable to organizations that use it to provide products and services to their customers, but it is also valuable to cyber criminals that steal it to obtain ill-gotten gains. Best in class organizations have implemented a variety of required controls and, while these are meant to have a positive impact on data security, many companies are left scratching their heads on how to effectively implement them. This session will provide an overview of the current cyber security landscape, describe current and future data privacy laws, and provide attendees with a list of cyber security controls that can be implemented to provide an effective cyber security defense.

Key Takeaways

In this session you’ll learn about current and future data privacy laws and what Insite Software is doing to stay ahead of the curve and remain compliant. We’ll cover compliance frameworks such as the Payment Card Industry (PCI), Europe's General Data Protection Regulation (GDPR), and the new California Consumer Privacy Act (CCPA). In addition, the session will summarize cyber security best practices that are designed to meet various compliance requirements and also provide an effective cyber security defense. Key takeaways include:

  • Understand the current cyber security landscape
  • Understand the scope and impact of PCI, GDPR and CCPA
  • Know what Insite Software is doing to remain compliant and protect its customer's data
  • General security best practices that can be implemented to maintain compliance and reduce cyber security risk


Presenter: Josh Essert
Title: Sr IT and Risk Compliance Manager
Company: Insite Software

Bio: Josh Essert is a seasoned and adaptable Information Security leader with 15+ years of experience in the manufacturing and financial sectors. Throughout his career he has obtained a number of industry recognized security certifications including the CISSP, GPEN, and PCI-ISA. His passion and leadership experience have allowed him to build out proven enterprise wide information security programs for a number of organizations.