27 Jul 2021 14:00 - 17:00 Asia/Jakarta

How to identify the most efficient information security frameworks and tools towards ensuring that organisations are legally and operationally compliant with the Philippine’s Data Privacy Act of 2012 and the EU Global Data Protection Regulations, and their related issuances? This webinar on Information Security Management System (ISO 27001) for Non-IT Professionals: Towards Strategic Compliance with Data Privacy Law and Regulations helps enterprises identify the most efficient information security frameworks and tools to ensure efficient cyber security.

Most companies have already started complying with the documentary requirements for data privacy law and regulations. However, many of those companies have yet to actually transition from legal compliance to operational compliance. This webinar highlights the deep correlation between data privacy and information security towards legal and operational compliance with existing laws and regulations.

The webinar aims to equip the participants with knowledge about the global standards in information security based on the control sets of ISO 27001 Information Security Management System and provide strategies to align these security measures with the internal policies, all towards strategic compliance with existing laws and regulations on data privacy and business continuity.

The security of information should be a top priority for any organisation, not least because of the growing cases of cyber-attacks and other cyber threats. New regulations such as the GDPR make it a legal requirement to protect personal data too. Achieving ISO 27001 certification will give organisations an excellent framework for building their ISO 27001 Information Security Management System (ISMS) and help address the relevant compliance requirements.

ISO 27001 will also demonstrate to influential external stakeholders that the organisation takes information security seriously and can be trusted with their valuable information assets, as well as theirs.

Quick poll
What's the primary benefit of integrating access control with video surveillance?