12 Months To Go: Simple Steps to Achieving GDPR Compliance

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

The days are being counted down to 25th May 2018, when GDPR compliance goes from being a talking point to a reality of data protection compliance. From then on, your responsibility to protect the personal data of European citizens is brought up to date with the modern age.

In this webinar, we will look at the key steps to achieve GDPR compliance, ask what you should be doing in the next 12 months and what your most immediate actions should be. We will also look at the impact of the UK leaving the European Union and key technology steps such as managed file transfer to ensure data protection and avoid the heavy fines that non-compliance to GDPR brings.

In this webinar you will:

  • Learn the important steps you should be taking now to achieve compliance
  • Understand that Brexit is not an excuse and how it adds more complexity
  • Know how GDPR applies to all companies
  • Consider options on data protection, such as managed file transfer


Rowenna Fielding

Data Protection Expert with Protecture

Monica Gupta

Sr. Product Marketing Manager, Ipswitch

    Eduardo Ustaran

    Partner, Hogan Lovells International LLP

    Brought to You by

    Should you register for this event your information will be shared with the sponsor indicated above. Please see Infosecurity Magazine’s privacy policy for additional information.