Personal data breach and the GDPR – Prevention, Detection and Notification
- LANGUAGE: English DATE: Thursday, March 23, 2017 TIME: 4:00pm CET, 11:00am EDT, 8:00am PDT
The general data protection regulation (GDPR) as issued by the European Union will be a major challenge for literally any organisation doing business in Europe. In roughly 15 months from now it will reach legally binding status in every country within the European Union. And beyond: Probably one of the most striking characteristics of the new regulation that is constantly underestimated is the scope of its applicability. It actually applies in all cases where the data controller or the data processor or the data subject is based in the EU. This includes all data processors (e.g. cloud service providers) or data controllers (e.g. retailers, social media, practically any organisation dealing with personally identifiable information) which are outside the EU, especially for example those in the US.
All systems dealing with data subject to data protection legislation (i.e. PII = personally identifiable information) will need to be compliant to the requirements of this regulation. And, quite logically, IT systems will in turn be key enablers for many organisations to achieve compliance to this new set of requirements.
In this webinar, you will learn about:
- The importance of compliance to the upcoming data protection regulation.
- Key principles of the GDPR.
- An overview of key requirements.
- How to deal with a personal data breach
- How to stay compliant even in case of a detected personal data breach
In the first part of the webinar, Matthias Reinwarth, Senior Analyst for KuppingerCole, will give an overview over the key concepts of the general data protection regulation. He will explain the importance of secure and appropriate systems and processes for achieving compliance and why every organisation should be well-prepared for all eventualities.
In the second part of the webinar, Duncan Mills, Senior Product Marketing Manager at CyberArk, will focus down on one specific part of the regulation that has been, to a large extent, neglected by the media – the importance of securing the supply chain. A key requirement of GDPR centres around controlling access of third parties to personal data. This will have a major impact, as organisations expand their ecosystems resulting in an increasing number of third parties processing data. And this is against a backdrop of an increasing number of breaches originating in third party systems. We will discuss how you can control and audit third party access to your systems to protect critical assets, contain attacks and minimise liability.
CyberArk is the #1 provider in privileged account security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise—on premises, in the cloud, on endpoints, and throughout the DevOps pipeline. Privileged accounts, credentials, and secrets allow anyone who gains possession of them to control organization resources, disable security systems, and access vast amounts of sensitive data.
CyberArk is the only public company 100% focused on privileged account security, and is trusted by more than 3,650 of the world’s leading organizations, including more than 50 % of the Fortune 100 and nearly 30% of the Global 2000, in almost 90 countries.
Digitalization evolves with the increased use of microcomputers in everyday objects like cars and smart fridges, but also in industrial applications. Therefore, communication between devices is growing accordingly. While connecting devices is supposed to make our lives easier, it poses a great challenge from a security standpoint. Every connection opens a potential backdoor for attackers to slip inside your network.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 12-15, 2020, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.
KuppingerCole analysts build upon competencies from comprehensive research, experience from highly topical PAM advisory projects and systematically expanded and advanced best practices. Our analysts and advisors offer a one-of-a-kind, multi-channel approach to modern knowledge transfer: the KuppingerCole Master Class Privileged Access Management. Webinars and webcasts, up-to-date research documents, an all-day classroom workshop with final exam and certification of the acquired skills lay the foundation for establishing the necessary technical and methodological knowledge in your own organization.