Personal data breach and the GDPR – Prevention, Detection and Notification

  • LANGUAGE: English DATE: Thursday, March 23, 2017 TIME: 4:00pm CET, 11:00am EDT, 8:00am PDT
Upcoming Webinars
Personal data breach and the GDPR – Prevention, Detection and Notification
The general data protection regulation (GDPR) as issued by the European Union will be a major challenge for literally any organisation doing business in Europe. In roughly 15 months from now it will reach legally binding status in every country within the European Union. And beyond: Probably one of the most striking characteristics of the new regulation that is constantly underestimated is the scope of its applicability. It actually applies in all cases where the data controller or the data processor or the data subject is based in the EU. This includes all data processors (e.g. cloud service providers) or data controllers (e.g. retailers, social media, practically any organisation dealing with personally identifiable information) which are outside the EU, especially for example those in the US.

All systems dealing with data subject to data protection legislation (i.e. PII = personally identifiable information) will need to be compliant to the requirements of this regulation. And, quite logically, IT systems will in turn be key enablers for many organisations to achieve compliance to this new set of requirements.

In this webinar, you will learn about:

  • The importance of compliance to the upcoming data protection regulation.
  • Key principles of the GDPR.
  • An overview of key requirements.
  • How to deal with a personal data breach
  • How to stay compliant even in case of a detected personal data breach

In the first part of the webinar, Matthias Reinwarth, Senior Analyst for KuppingerCole, will give an overview over the key concepts of the general data protection regulation. He will explain the importance of secure and appropriate systems and processes for achieving compliance and why every organisation should be well-prepared for all eventualities.

In the second part of the webinar, Duncan Mills, Senior Product Marketing Manager at CyberArk, will focus down on one specific part of the regulation that has been, to a large extent, neglected by the media – the importance of securing the supply chain. A key requirement of GDPR centres around controlling access of third parties to personal data. This will have a major impact, as organisations expand their ecosystems resulting in an increasing number of third parties processing data. And this is against a backdrop of an increasing number of breaches originating in third party systems. We will discuss how you can control and audit third party access to your systems to protect critical assets, contain attacks and minimise liability.


Speakers

Duncan joined CyberArk in August 2016, as Senior Product Marketing Manager, to manage the global go-to-market strategy for the CyberArk Endpoint Privilege Manager product line. Duncan has over twenty years’ experience in IT product management and marketing, the last fifteen focused on the...


Lead Sponsor

CyberArk is the #1 provider in privileged account security, a critical layer of IT security to protect data, infrastructure and assets across the enterprise—on premises, in the cloud, on endpoints, and throughout the DevOps pipeline. Privileged accounts, credentials, and secrets allow anyone who gains possession of them to control organization resources, disable security systems, and access vast amounts of sensitive data.

CyberArk is the only public company 100% focused on privileged account security, and is trusted by more than 3,650 of the world’s leading organizations, including more than 50 % of the Fortune 100 and nearly 30% of the Global 2000, in almost 90 countries. 

Watch now

Downloads

Webinar Presentation, KuppingerCole

Webinar Presentation, CyberArk

Webcast download

Popular Webcasts

Next Webinar

Webinar

Best Practices of Privileged Identity Management

Security and risk management leaders need to balance the significant security risks associated with unmanaged privileged access against the administrative and other operational efficiencies achieved by conventional privileged access management practices.

Next Conference

Conference

Consumer Identity World USA 2018

The Consumer Identity World USA is the place where you get input for your perfect CIAM Strategy. Learn more about Privacy by Design, Consent Life Cycle Management and the needs of your customers. Get to know how to secure their personal information in a strategic and user-friendly way.

Become a Sponsor

Call

+49 211 23707710
Mo – Fr 8:00 – 17:00