Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Protecting Your Moving Data – What to Consider When Implementing IT Controls to Comply with GDPR

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

The general data protection regulation (GDPR) took a major leap forward in December as the EU Parliament and Council agreed on a text for the bill.

When approved, the GDPR will become law in 2018 across all 28 EU Member States and will supersede inconsistent laws across the EU Member States.

Upon ratification of the GDPR, we could see: fines of up to 4% of annual turnover for firms which break the rules; mandatory notification of “serious” breaches to the relevant national supervisory authority; a single regulator for multi-national companies regardless of HQ location; and the need to meet “right to be forgotten” and “right to data portability” rules by large internet service providers.

In this webinar, we’ll point our long lenses at 2018 and look at the challenges and address key questions such as:

  • What kind of risk assessment are you going to have to do on your business to ensure compliance?
  • With this regulation and the end of Safe Harbor, how will partnering with American Global businesses, including SaaS technology vendors, change?
  • What are the key security and compliance considerations for data in motion such as: data location including storage in the cloud, data encryption and key management, and data lifecycle management.
  • What are key IT controls and technology capabilities required to meet requirements specific to this regulation?

Speakers

Paul Castiglione

Senior Product Marketing Manager - Ipswitch

    Martin Hoskins

    Managing Director, Privacy Consulting

    Dan  Raywood

    Contributing Editor, Infosecurity Magazine

    Brought to You by