GDPR: Myths and Urban Legends

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

You've heard all about the impending doom that the GDPR regulations will bring after 25 May 2018 and how your organization must prepare to be compliant. However, it might not be as bad as you think and it most definitely won’t be as bad as you've been told.

Scaremongering aside, in this webinar we’ll dispel some common GDPR myths and cover what actually constitutes a personal data breach under the Article 29 Working Party’s GDPR guidance. We’ll also give you advice on how to respond to a breach in your environment and how you can remediate in the worst case scenario.

Key Takeaways:

  • What is a breach under the GDPR
  • What you need to do in case of a breach
  • Key metrics you can benchmark your SOC against

Speakers

Photo of Drew Bagley

Drew Bagley

Privacy Counsel & Director of Global Cyber Policy, CrowdStrike

Photo of Michael Hill

Michael Hill

Former Editor, Infosecurity Magazine

Photo of Matt Palmer

Matt Palmer

Director, Jersey Cyber Security Centre

Photo of Dee Richartz

Dee Richartz

Services Director, EMEA, CrowdStrike

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for CrowdStrike here: https://www.crowdstrike.com/privacy-notice/. Please see Infosecurity Magazine’s privacy policy for more information.