Implementing GDPR Conference
“GDPR preparation doesn’t end on May 25, it requires ongoing effort. You will be expected to continue to identify and address emerging privacy and security risks in the weeks, months and years beyond.” – Elizabeth Denham, Information Commissioner
With strict new rules governing transparency, customer opt-ins and the reporting of data breaches, GDPR has been a described as a “game changer for everyone” in the both the public and private sectors.
But while many organisations have focused on securing GDPR compliance ahead of the May 2018 deadline, this date is just the beginning of a major transformation in the way we collect, store and use data.
Join us for the Implementing GDPR Conference where leading experts will assess the legislation’s impact so far and help ensure your organisation is fully prepared for the future. Taking place one month after the GDPR deadline, this conference will give you the opportunity to compare your GDPR performance with examples of best practice, understand your obligations under the new regulations and re-evaluate your data security procedures.
Please register interest below and we will keep you updated
|Date||Venue||Price from:||Status||Spaces||Book Now||Enquire|
Find out the requirements of a 72-hour breach notification period?
How do you define what a breach is within your organisation?
How to avoid non-compliance fines during an organisational data breach?
Find out how to develop and implement a successful response strategy to a breach
Understand the Human Factors of GDPR
An Overview of Subject Access Requests under the DPA vs GDPR
How to implement a positive data culture, bringing GDPR & Privacy to the forefront of the workplace
How to minimise the number of Subject Access Requests
Find out how to develop and implement a Subject Access Request strategy to comply with GDPR
How do you harness the GDPR to build trust?
How can technology help with GPDR's implementation?
Why cyber security is integral to GDPR compliance and what changes will you need to make to your cyber security practices?