GDPR compliance tips from our experts

GDPR compliance tips from our experts

Welcome to this week’s Security Spotlight, where we shine a light on:  

  • Our upcoming webinar on the DPO role  

  

New blog | How a GDPR Gap Analysis Helps Secure Support From Senior Management

When implementing a GDPR (General Data Protection Regulation) compliance programme, a key challenge is securing the required resources and support – particularly from top management.

How can you get management to understand the benefits of GDPR compliance, and more to the point, understand how far away the organisation is from compliance?

Read the full blog

 

  

New Q&A | Why You Need Cyber Resilience and Defence in Depth

Cyber resilience combines cyber security with the ability to detect, respond to and recover from cyber incidents.

This goes hand in hand with defence in depth – a dynamic approach, which has multiple security measures working together, so if one layer fails, another will still prevent an attacker from succeeding.

Our head of GRC (governance, risk and compliance) consultancy, Damian Garcia, discusses:

·       Cyber incidents are a matter of ‘when, not if’

·       People and security

·       Bias in risk assessment

·       Combining ISO 27001 with ISO 22301

·       Defence in depth

 

Read the full interview 

 

  

New Q&A | 3 Common GDPR Challenges and How to Overcome Them

Are you responsible for data protection and GDPR compliance? The chances are you’ve come across these three common challenges:

·       Getting management support

·       Knowing where to start with data protection

·       Understanding what being a data privacy lead really means

Our data privacy trainer Andy Snow hears about these challenges a lot, having trained over 4,000 people on the GDPR.

In this interview, he gives his practical tips for overcoming them.

Read the full blog 

 

Free green paper | Implementing an ISMS – The nine-step approach  

Good information security is about addressing the risks specific to your organisation without compromising your business objectives.  

So, take an approach that’s both strategic and operational.  

An ISMS – preferably aligned with ISO 27001 – takes a systematic approach to managing confidential information so that it remains secure.  

Learn our 9-step approach to implementation, which we’ve used to help 800+ organisations around the world achieve ISO 27001 compliance.  

Download now  

  

Free green paper | Penetration Testing and ISO 27001 – Securing your ISMS  

As part of your ISO 27001 risk assessment, you must identify security risks within your ISMS scope.  

This free green paper explains how you can do this through penetration testing.  

Download now 

  

Free webinar | The Critical Role of a DPO: Why Outsourcing is the Smart Choice  

Tuesday, 28 January 2025, 3:00 – 4:00 pm (GMT)  

As data protection regulations become more stringent, the DPO role under the GDPR is more critical than ever.  

This webinar, led by Dr Loredana Tassone and Natalie Whitney, will explore:  

  • The legal requirements for a DPO  

  • The benefits of outsourcing the role  

  • What you can expect from a DPO as a service, and how it can prove a cost-effective solution for maintaining robust data protection  

Register now  

  

Speak to an information security expert  

With 20+ years’ experience in information security, we understand risk management.  

Our experts have implemented information security programmes for hundreds of organisations across a multitude of industries in both the private and public sectors.  

New to the world of information security and need advice on how to get started?  

Or updating an existing information security programme?  

Our experts are here to help.  

Get in touch  

  

To view or add a comment, sign in

Explore topics