Protecting Your Moving Data – What to Consider When Implementing IT Controls to Comply with GDPR

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

The general data protection regulation (GDPR) took a major leap forward in December as the EU Parliament and Council agreed on a text for the bill.

When approved, the GDPR will become law in 2018 across all 28 EU Member States and will supersede inconsistent laws across the EU Member States.

Upon ratification of the GDPR, we could see: fines of up to 4% of annual turnover for firms which break the rules; mandatory notification of “serious” breaches to the relevant national supervisory authority; a single regulator for multi-national companies regardless of HQ location; and the need to meet “right to be forgotten” and “right to data portability” rules by large internet service providers.

In this webinar, we’ll point our long lenses at 2018 and look at the challenges and address key questions such as:

  • What kind of risk assessment are you going to have to do on your business to ensure compliance?
  • With this regulation and the end of Safe Harbor, how will partnering with American Global businesses, including SaaS technology vendors, change?
  • What are the key security and compliance considerations for data in motion such as: data location including storage in the cloud, data encryption and key management, and data lifecycle management.
  • What are key IT controls and technology capabilities required to meet requirements specific to this regulation?


Paul Castiglione

Senior Product Marketing Manager - Ipswitch

    Martin Hoskins

    Managing Director, Privacy Consulting

    Brought to You by

    Should you register for this event your information will be shared with the sponsor indicated above. Please see Infosecurity Magazine’s privacy policy for additional information.