Privacy concerns have led to constraints around how and where personal data is processed. Security and risk management leaders can manage constraints while respecting individual privacy by applying PEC techniques in AI modelling, cross-border data transfers, and data analytics.
Strategic Planning Assumption(s)
Impacts and Recommendations
Gartner Recommended Reading