Step-by-Step Guide to GDPR Compliance
- LANGUAGE: English DATE: Tuesday, December 12, 2017 TIME: 4:00pm CET, 10:00am EST, 7:00am PST
Decrypting the Requirements, Defining Action Plans, Selecting the Right Tools
Many people still have only a vague idea how to start planning for the GDPR, even after reading numerous publications and discussions and being bombarded from all directions with promises to solve all compliance challenges once and for all. This is completely understandable, since the regulation with its 11 chapters and 99 articles is very difficult to comprehend, to say nothing about translating the mixture of technical and legalese terms into concrete actions.
The goal of this webinar is to help people decrypt the bureaucratic language of the regulation, to clarify each of its major requirements, such as managing user consent, appointing a data protection officer and reporting data breaches, and outline an actionable plan that your company needs to adopt to comply with them. Last but not least, we are going to explain how to select the right security solutions that will help you achieve compliance and how avoid false promises of “GDPR-compliant software”.
After attending this webinar, you should be able to:
- Easily understand the various requirements of the GDPR
- Raise awareness of these requirements among executives
- Learn the techniques for making GDPR auditing easier
- Define a step-by-step plan towards implementing GDPR compliance
- Select the right security solutions to help you stay on track
In the first part of the webinar, Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, will look at the new requirements imposed by GDPR. A specific focus of him will be the need of understanding where PII resides and how it flows across your organization. Furthermore, he will talk about new challenges for IT departments introduced by the new breach notification requirements.
In the second part, Derek Melber, Technical Evangelist at ManageEngine, will outline concrete actions organizations should take to fulfill GDPR requirements and avoid penalties. He will describe the multitude of tools needed to implement those actions, from restricting privileged access to advanced log analytics and rapid response.
ManageEngine is bringing IT together for IT teams that need to deliver real-time services and support. Worldwide, established and emerging enterprises -including more than 60 percent of the Fortune 500 - rely on our real-time IT management tools to ensure tight business-IT alignment and optimal performance of their IT infrastructure, including networks, servers, applications, desktops and more.
The greatest cybersecurity threat an organization faces is no longer the malicious outsider hacking from beyond network firewalls. It is the insiders - the contractors, third-party vendors, and even your own privileged employees who already have full access to your company's systems and sensitive data. Any of those can cause substantial damage to your business by leaking confidential information, disrupting access to a critical system or simply draining your bank account. The most privileged users in this regard are no longer the IT administrators, but the CEO or CFO, and the number of new attacks targeting them specifically is on the rise.
Come to the place where the Digital Transformation is happening. The European Identity & Cloud Conference, held from May 14-17, 2019, offers a mixture of best practice discussions, visionary presentations, and networking opportunities with a future-oriented community. More than 800 thought leaders, leading vendors, analysts, executives, and end-users get together in Munich to be inspired by a list of world-class speakers.