GDPR international transfers, access control, DORA compliance, and more

GDPR international transfers, access control, DORA compliance, and more

Welcome to this week’s Security Spotlight, where we shine a light on:?

  • Our free green paper on implementing an ISMS?

  • Our free green paper on penetration testing?



New blog | A guide to GDPR international transfers?

Data privacy trainer and DPO Andrew Snow explains 7 mechanisms for restricted transfers under the UK and EU GDPR:?

  • Adequacy decisions?
  • IDTA?
  • BCRs?
  • Codes of conduct?
  • Certification?
  • Derogations?
  • Compelling legitimate interest?
  • He also explains how to choose the right mechanism.?

Read more ?

?

New blog | What access control is, and why Cyber Essentials and ISO 27001 require it?

Cyber security advisor Ashley Brett explains:?

  • How access control works?

  • Why it’s important?

  • How to implement it?

  • ISO 27001 and Cyber Essentials requirements for access control?

  • Practical tips for meeting the Cyber Essentials requirements??

Read more ?

?


Q&A | Simplifying DORA compliance with ISO 27001?

The head of GRC consultancy at IT Governance Europe, Andrew Pattison, explains:?

  • The key principles underpinning DORA?

  • DORA’s proportionality principle?

  • How ISO 27001 can help you comply with DORA?

  • How operational resilience differs from business continuity?

Read the full interview ?

?


New blog | Tips for environmental sustainability at work and how ISO 14001 can help?

Creating a sustainable work environment is crucial – not just to reduce our ecological footprint, but also to foster a culture of responsibility and long-term success.?

Get practical sustainability tips in this blog, and learn:?

  • What ISO 14001 is?

  • The impact of implementing it?

  • The benefits of the Standard?

Read more ?

?

New blog | Processor contracts: GDPR requirements and how to protect yourself from liability?

Louise Brooks, head of consultancy at our sister company DQM GRC:?

  • Explains the GDPR requirements for controller–processor contracts?

  • Gives tips for reviewing your contracts?

  • Explains who’s liable for a data breach?

  • Gives real-life examples?

Read more ?

?


Free green paper | Implementing an ISMS – The nine-step approach?

Good information security is about addressing the risks specific to your organisation without compromising your business objectives.?

Your overall approach to security should therefore be strategic as well as operational.?

An ISMS – preferably aligned with ISO 27001 – takes a systematic approach to managing confidential information so that it remains secure.?

This paper explains our 9-step approach to implementation, which we’ve used to help 800+ organisations around the world achieve ISO 27001 compliance.?

Download now?

?

Free green paper | Assured Security – Getting cyber secure with penetration testing?

Discover:?

  • What penetration testing is and how it works?

  • The types of vulnerabilities that can go undetected for months?

  • Why penetration tests are the best solution to uncovering vulnerabilities before criminals do?

  • The different types of penetration test?

Download now?

?


Free panel discussion | Bridging DORA and Compliance Frameworks with an ISO 27001-Certified ISMS?

Wednesday, 4 September 2024, 3:00 pm (BST)?

In an era where DORA and other regulatory frameworks are shaping the landscape of cyber compliance, ISO 27001 emerges as a linchpin.?

What are the synergies between ISO 27001 and a myriad of compliance frameworks? How can a robust, certified ISMS serve as a bridge to compliance and resilience??

This panel discussion, featuring Alan Calder, Alice Turley and Andrew Pattison, will explore these questions and more.?

Register now ?

?

Workshop | Data Flow Mapping Workshop?

Monday, 16 September 2024, 2:00–4:00 pm (BST)?

Take this hands-on, 2-hour workshop to improve your skills in data flow mapping: a critical process for maintaining GDPR compliance and one that is central to the DPO role.?

Become confident in your ability to identify and address data privacy risks when liaising with internal and external stakeholders.?

This session, led by Alice Turley, will guide you through how to use CyberComply for practical data flow mapping, including a real-world HR mapping exercise.?

You’ll also learn how effective data flow mapping supports DPIAs, DSARs, and other GDPR compliance activities.?

Register now ?

?


Speak to a cyber security expert?

With 20+ years’ experience in cyber security, we understand risk management.?

Our experts have implemented cyber security programmes for hundreds of organisations across a multitude of industries in both the private and public sectors.?

New to the world of cyber security and need advice on how to get started??

Or updating an existing cyber security programme??

Our cyber security experts are here to help.?

Get in touch ?

?

要查看或添加评论,请登录

社区洞察

其他会员也浏览了