Strategic Information Security Investment Planning - The Legal Perspective

  • LANGUAGE: English DATE: Tuesday, October 15, 2013 TIME: 4:00pm CEST, 10:00am EDT, 7:00am PDT
Upcoming Webinars

The ever increasing challenge of meeting regulatory compliance is putting more and more pressure on your information security budget? Then it may be time to include some legal arguments to convince your management that you need to spend more on information security. In this webinar, KuppingerCole´s Fellow Analyst, Lawyer and Data Protection expert will help you finding these arguments.

We all are experiencing that meeting regulatory compliance is getting more and more difficult and sometimes it is close to impossible. There is the new EU privacy regulation coming up, which most likely will put new pressure on organizations. But there are also less well-known challenges such as the liability for the loss of intellectual property by Industrial Espionage and other types of attacks, the potential issues caused by not properly selecting Cloud Providers, or the consequences of incorrectly dealing with mobile devices and – just as one example – remote wiping of devices that hold both business and private data. In this webinar, Dr. Karsten Kinast will help you master the legal vokabulary in a way that you easily will be able to find a huge number of arguments to let your management increase the information security budget. 

This webinar is a great opportunity to prepare yourself for the KuppingerCole Information Risk & Security Summit on 27th and 28th November in Frankfurt.


Speakers

Dr. Karsten Kinast, LL.M., Attorney at Law (Germany), is founding Partner of the Law Firm “Kinast & Partner” with an exclusive focus on Data Protection Law and IT-Law. He holds a Master of Laws Degree in European Legal Informatics and  serves as external Data Protection...

Watch now

Downloads

Popular Videos

Next Webinar

Webinar

Sicherheit für SAP und mehr: Wie IGA-Systeme unterstützen können

Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der Durchführung von Kampagnen zur Zugriffszertifizierung und der Implementierung und Prüfung von Controls für die Funktionstrennung (SOD). Mit einer wachsenden Zahl von Business-Applikationen, gerade auch aus der Cloud, und ihrer Vernetzung wächst die Herausforderung, Access Governance übergreifend und automatisiert umzusetzen.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00