Personal data breach and the GDPR – Prevention, Detection and Notification
- LANGUAGE: English DATE: Thursday, March 23, 2017 TIME: 4:00pm CET, 11:00am EDT, 8:00am PDT
The general data protection regulation (GDPR) as issued by the European Union will be a major challenge for literally any organisation doing business in Europe. In roughly 15 months from now it will reach legally binding status in every country within the European Union. And beyond: Probably one of the most striking characteristics of the new regulation that is constantly underestimated is the scope of its applicability. It actually applies in all cases where the data controller or the data processor or the data subject is based in the EU. This includes all data processors (e.g. cloud service providers) or data controllers (e.g. retailers, social media, practically any organisation dealing with personally identifiable information) which are outside the EU, especially for example those in the US.
All systems dealing with data subject to data protection legislation (i.e. PII = personally identifiable information) will need to be compliant to the requirements of this regulation. And, quite logically, IT systems will in turn be key enablers for many organisations to achieve compliance to this new set of requirements.
In this webinar, you will learn about:
- The importance of compliance to the upcoming data protection regulation.
- Key principles of the GDPR.
- An overview of key requirements.
- How to deal with a personal data breach
- How to stay compliant even in case of a detected personal data breach
In the first part of the webinar, Matthias Reinwarth, Senior Analyst for KuppingerCole, will give an overview over the key concepts of the general data protection regulation. He will explain the importance of secure and appropriate systems and processes for achieving compliance and why every organisation should be well-prepared for all eventualities.
In the second part of the webinar, Duncan Mills, Senior Product Marketing Manager at CyberArk, will focus down on one specific part of the regulation that has been, to a large extent, neglected by the media – the importance of securing the supply chain. A key requirement of GDPR centres around controlling access of third parties to personal data. This will have a major impact, as organisations expand their ecosystems resulting in an increasing number of third parties processing data. And this is against a backdrop of an increasing number of breaches originating in third party systems. We will discuss how you can control and audit third party access to your systems to protect critical assets, contain attacks and minimise liability.
1 Pear Pl, South Bank • SE1 8SB London • United Kingdom
CyberArk (NASDAQ: CYBR) is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets. To learn more about CyberArk, visit https://www.cyberark.com, read the CyberArk blogs or follow on Twitter via @CyberArk, LinkedIn, XING or Facebook.
As users, devices and application workloads move outside the corporate network, the traditional model of enforcing security at the network perimeter is no longer effective. A Zero Trust model offers an alternative that secures data while ensuring it is accessible to employees, regardless of where they are working. But the path to achieving Zero Trust is unclear for many organizations.