GDPR compliance tips from our experts
Welcome to this week’s Security Spotlight, where we shine a light on:
How a GDPR gap analysis helps secure support from senior management
Our free green papers on implementing ISO 27001 and how pen testing fits into your ISMS
Our upcoming webinar on the DPO role
New blog | How a GDPR Gap Analysis Helps Secure Support From Senior Management
When implementing a GDPR (General Data Protection Regulation) compliance programme, a key challenge is securing the required resources and support – particularly from top management.
How can you get management to understand the benefits of GDPR compliance, and more to the point, understand how far away the organisation is from compliance?
New Q&A | Why You Need Cyber Resilience and Defence in Depth
Cyber resilience combines cyber security with the ability to detect, respond to and recover from cyber incidents.
This goes hand in hand with defence in depth – a dynamic approach, which has multiple security measures working together, so if one layer fails, another will still prevent an attacker from succeeding.
Our head of GRC (governance, risk and compliance) consultancy, Damian Garcia, discusses:
· Cyber incidents are a matter of ‘when, not if’
· People and security
· Bias in risk assessment
· Combining ISO 27001 with ISO 22301
· Defence in depth
New Q&A | 3 Common GDPR Challenges and How to Overcome Them
Are you responsible for data protection and GDPR compliance? The chances are you’ve come across these three common challenges:
· Getting management support
· Knowing where to start with data protection
· Understanding what being a data privacy lead really means
Our data privacy trainer Andy Snow hears about these challenges a lot, having trained over 4,000 people on the GDPR.
In this interview, he gives his practical tips for overcoming them.
Free green paper | Implementing an ISMS – The nine-step approach
Good information security is about addressing the risks specific to your organisation without compromising your business objectives.
So, take an approach that’s both strategic and operational.
An ISMS – preferably aligned with ISO 27001 – takes a systematic approach to managing confidential information so that it remains secure.
Learn our 9-step approach to implementation, which we’ve used to help 800+ organisations around the world achieve ISO 27001 compliance.
Free green paper | Penetration Testing and ISO 27001 – Securing your ISMS
As part of your ISO 27001 risk assessment, you must identify security risks within your ISMS scope.
This free green paper explains how you can do this through penetration testing.
Free webinar | The Critical Role of a DPO: Why Outsourcing is the Smart Choice
Tuesday, 28 January 2025, 3:00 – 4:00 pm (GMT)
As data protection regulations become more stringent, the DPO role under the GDPR is more critical than ever.
This webinar, led by Dr Loredana Tassone and Natalie Whitney, will explore:
The legal requirements for a DPO
The benefits of outsourcing the role
What you can expect from a DPO as a service, and how it can prove a cost-effective solution for maintaining robust data protection
Speak to an information security expert
With 20+ years’ experience in information security, we understand risk management.
Our experts have implemented information security programmes for hundreds of organisations across a multitude of industries in both the private and public sectors.
New to the world of information security and need advice on how to get started?
Or updating an existing information security programme?
Our experts are here to help.