GDPR international transfers, access control, DORA compliance, and more
Welcome to this week’s Security Spotlight, where we shine a light on:?
New blog | A guide to GDPR international transfers?
Data privacy trainer and DPO Andrew Snow explains 7 mechanisms for restricted transfers under the UK and EU GDPR:?
?
New blog | What access control is, and why Cyber Essentials and ISO 27001 require it?
Cyber security advisor Ashley Brett explains:?
?
Q&A | Simplifying DORA compliance with ISO 27001?
The head of GRC consultancy at IT Governance Europe, Andrew Pattison, explains:?
?
New blog | Tips for environmental sustainability at work and how ISO 14001 can help?
Creating a sustainable work environment is crucial – not just to reduce our ecological footprint, but also to foster a culture of responsibility and long-term success.?
Get practical sustainability tips in this blog, and learn:?
?
New blog | Processor contracts: GDPR requirements and how to protect yourself from liability?
Louise Brooks, head of consultancy at our sister company DQM GRC:?
领英推荐
?
Free green paper | Implementing an ISMS – The nine-step approach?
Good information security is about addressing the risks specific to your organisation without compromising your business objectives.?
Your overall approach to security should therefore be strategic as well as operational.?
An ISMS – preferably aligned with ISO 27001 – takes a systematic approach to managing confidential information so that it remains secure.?
This paper explains our 9-step approach to implementation, which we’ve used to help 800+ organisations around the world achieve ISO 27001 compliance.?
?
Free green paper | Assured Security – Getting cyber secure with penetration testing?
Discover:?
?
Free panel discussion | Bridging DORA and Compliance Frameworks with an ISO 27001-Certified ISMS?
Wednesday, 4 September 2024, 3:00 pm (BST)?
In an era where DORA and other regulatory frameworks are shaping the landscape of cyber compliance, ISO 27001 emerges as a linchpin.?
What are the synergies between ISO 27001 and a myriad of compliance frameworks? How can a robust, certified ISMS serve as a bridge to compliance and resilience??
This panel discussion, featuring Alan Calder, Alice Turley and Andrew Pattison, will explore these questions and more.?
?
Workshop | Data Flow Mapping Workshop?
Monday, 16 September 2024, 2:00–4:00 pm (BST)?
Take this hands-on, 2-hour workshop to improve your skills in data flow mapping: a critical process for maintaining GDPR compliance and one that is central to the DPO role.?
Become confident in your ability to identify and address data privacy risks when liaising with internal and external stakeholders.?
This session, led by Alice Turley, will guide you through how to use CyberComply for practical data flow mapping, including a real-world HR mapping exercise.?
You’ll also learn how effective data flow mapping supports DPIAs, DSARs, and other GDPR compliance activities.?
?
Speak to a cyber security expert?
With 20+ years’ experience in cyber security, we understand risk management.?
Our experts have implemented cyber security programmes for hundreds of organisations across a multitude of industries in both the private and public sectors.?
New to the world of cyber security and need advice on how to get started??
Or updating an existing cyber security programme??
Our cyber security experts are here to help.?
?