Streamlining GDPR compliance, and a practical approach to BIA

Streamlining GDPR compliance, and a practical approach to BIA

Welcome to this week’s Security Spotlight, where we shine a light on:?

  • Webinar on demand: CrowdStrike – What went wrong and how to avoid being Strike 2?

  • Free webinar : Navigating the 2024 Privacy Landscape with ISO 27001 and CyberComply?


?New blog | Streamlining GDPR compliance with ROPAs, data flow maps and DPIAs?

Few people like spreadsheets. Fewer still like multiple spreadsheets.?

Similarly, few people enjoy complex compliance, with documentation scattered in many places.?

One way to streamline GDPR compliance is to make your ROPAs a focal point. Another is to look at your ROPAs together with data flow maps and DPIAs.?

DPO and data privacy trainer Andy Snow explains how to simplify and streamline GDPR compliance.?

We also cover how to automate GDPR compliance.?

Read the full interview ?

?

New blog | A practical approach to business impact analysis?

BIA is a process usually associated with?business continuity?and operational resilience – areas that have been on many organisations’ minds following the?CrowdStrike outage.?

It involves identifying your key business activities, then determining how quickly, in what order, and what resources you need to restore them to minimum functionality or availability in the event of a disruption.?

Andrew Pattison, head of GRC consultancy at IT Governance Europe, explains a practical approach to BIA.?

Read the full interview ?

?

?New blog | GDPR data protection principles and accountability?

The GDPR’s data protection principles are fundamental to data protection. Failing to comply with them can result in a fine up to £17.5 million or 4% of global annual turnover (whichever is greater).?

This blog takes a closer look at what those principles are, and how to comply with them. It also discusses how to demonstrate compliance (accountability).?

Read more ?

?

New blog | Guide to ISO 27001:2022 security awareness training?

Though security rests on 3 pillars – people, processes and technology – many organisations overlook the ‘people’ factor.?

But ‘awareness’ is a specific ISO 27001 requirement – Clause 7.3. Not to mention how the insider threat caused more than two-thirds of data breaches last year, according to Verizon.?

This blog explains how to meet the Clause 7.3 requirements.?

Read more ?

?


Webinar on demand | CrowdStrike – What went wrong and how to avoid being Strike 2?

Our popular webinar about lessons from the CrowdStrike outage is now available on demand!?

Download now?

You can also read what information security manager Adam Seamons has to say on the incident in this interview .?


Free white paper | Mastering Data Privacy in the Age of Artificial Intelligence?

Our sister company DQM GRC explains what data processors and controllers using AI need to consider, integrating AI systems with privacy by design in mind, data security measures for AI systems, and much more.?

Download now ?

?

Free webinar | Navigating the 2024 Privacy Landscape with ISO 27001 and CyberComply?

As global data privacy laws tighten, compliance professionals face a complex maze of regulations that can be overwhelming.?

This webinar with Alan Calder will cover:?

  • An overview of the 2024 data privacy landscape and the role of ISO 27001?

  • Key changes in EU–US data privacy frameworks and the implications for organisations?

  • Strategies for leveraging ISO 27001 to enhance data protection and GDPR compliance?

  • The importance of adopting an integrated approach to privacy compliance?

Register now ?

?

Free panel discussion | Bridging DORA and Compliance Frameworks with an ISO 27001-Certified ISMS?

Wednesday, 4 September 2024, 3:00 pm (BST)?

In an era where DORA and other regulatory frameworks are shaping the landscape of cyber compliance, ISO 27001 emerges as a linchpin.?

What are the synergies between ISO 27001 and a myriad of compliance frameworks? How can a robust, certified ISMS serve as a bridge to compliance and resilience??

This panel discussion, featuring Alan Calder, Alice Turley and Andrew Pattison, will explore these questions and more.?

Register now ?

?

Speak to a cyber security expert?

With 20+ years’ experience in cyber security, we understand risk management.?

Our experts have implemented cyber security programmes for hundreds of organisations across a multitude of industries in both the private and public sectors.?

New to the world of cyber security and need advice on how to get started??

Or updating an existing cyber security programme??

Our cyber security experts are here to help.?

Get in touch ?

?

?

要查看或添加评论,请登录

社区洞察

其他会员也浏览了