Our website uses cookies

Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing Infosecurity Magazine, you agree to our use of cookies.

Okay, I understand Learn more

Virtually Solving the Path to GDPR Compliance

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up for yours below.

Log In

Sign Up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in out online comments.
Your password should be at least six characters long. It is case sensitive. Passwords can only consist of alphanumeric characters or ~!@#$%^&*()_-+=?.

By registering you agree with our terms and conditions and privacy policy.

The “General Data Protection Regulation” (GDPR) will come into force in May 2018 and organizations have until then to review their processes and security strategies in order to comply with it. Failure to do so will expose them to significant sanctions in the event of a data security breach – fines of up to 20 Million Euros or 4% of global group revenue, whichever sum is the greatest.

Businesses should now be seeking the best ways to enable compliance, and to do so in an ever-changing security landscape organizations would be best served to consider a virtual solution. A zero-trust model inside the data center allows for data-centric adaptive security and better protection of sensitive information processed by applications by controlling, in real-time, the security risk level of each workload and automating remediation in the event of a Virtual Machine being compromised.

In this webinar, we will look at and analyze the latest announcements around the GDPR, understand the key areas to comply with and what your options are with technology. Key takeaways:

  • How to micro-segment a network using virtualization to reduce data breach incidents
  • Effective deployment of security controls within the data center
  • How to build data-centric and adaptive security policies that will prevent against sensitive data exfiltration

Speakers

Peter Jones

Technical Director, Dynamiq Management

    Dan  Raywood

    Contributing Editor, Infosecurity Magazine

    Eduardo Ustaran

    Partner, Hogan Lovells International LLP

      Ghaleb Zekri

      NSX Senior Systems Engineer, EMEA, VMware

        Brought to You by