Download PDF version Contact company

As a growing number of data privacy regulations are enforced around the world, make sure the risk management is in order. Compliance with modern privacy regulations requires a risk-based approach and by doing so, one will have the answers to the following, challenging questions:

  • Is the business set up to adequately protect the rights and freedoms of natural persons – on an ongoing basis?
  • How does one decide whether they have the right balance to fit with the overall risk tolerance?
  • Is this reducing risks to the business? If so, by how much?
  • What level of priority and investment should one dedicate to this effort?

Join the upcoming webinar to find out how an organisation can manage privacy and security risks to avoid regulatory fines and other reputational or financial damage. Due to high demand and to accommodate the worldwide userbase, this session will run at two separate times on Wednesday 25th September.

Presenter: Andy Boden
Date: September 25, 2019
Duration: 30 minutes

Session1:
Time: 10:00 BST / 13:00 GST / 04:00 CDT 

Session 2: 
Time: 17:00 BST / 20:00 GST / 11:00 CDT

Registrations for both sessions have already begun.

Download PDF version Download PDF version

In case you missed it

What new and emerging threats do security professionals face?
What new and emerging threats do security professionals face?

There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organisations to t...

Real time crime centres - policing's new hub
Real time crime centres - policing's new hub

As city managers, law enforcement agencies, and first responders face mounting pressure to combat crime and respond to emergencies with limited resources, real-time crime centres e...

Mitigating cybersecurity risks in industrial control systems with Honeywell
Mitigating cybersecurity risks in industrial control systems with Honeywell

Cybersecurity threats targeting organisations' industrial control systems (ICS) are not always direct. Instead, the most vulnerable entries to an ICS can start with external partne...

Quick poll
Which feature is most important in a video surveillance system?