Countdown to GDPR: How ISO/IEC 27001 can help achieve GDPR compliance & reduce data breach risks

MessageThis Webinar is over
Date May 17, 2018
Time 01:00 PM EDT
Cost $159.00
Online
OVERVIEW
International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 27001 certification confirms that your organization has appropriate controls in place to reduce the risk of serious data security threats and reduces the exploitation of vulnerabilities within your organization’s systems.
Organizations have until 25 May 2018 to comply with the European Union General Data Protection Regulation (GDPR). The GDPR encourages the use of certification schemes like International Organization for ISO/IEC 27001 to demonstrate the organization is actively managing data protection mechanisms in line with international best practice.
By implementing ISO/IEC 27001, your organization is deploying an information security management system that enables support by top leadership; organizational culture and strategy integration, with constant monitoring, updating and reviewcapabilities. Your organization will be able to ensure that the information security management system adapts to changes – both in the external and internal business environment – as well as identifies and reduces risks throughusing a process of continual improvement.
WHY SHOULD YOU ATTEND
Though many businesses understand the importance of implementing the right procedures to detect, report and investigate a data breach in compliance with the GDPR, not many are aware of the benefits of implementing ISO/IEC 27001 standards compliant with an information security management system deployment. ISO/IEC 27001 premits an excellent starting point for achieving the technical and operational requirements necessary to assist in preventing a data breach under the GDPR.
An information security management system is a management information system representing the aggregation of technological and organizational resources supporting data processing to produce information utilized for decision-making or problem-solving.Using an information security management system configuration can assist organizations, no matter the size and sector, in taking a systematic risk-based approach to managing and securing sensitive company data. ISO/IEC 27001 certification provides customers and other stakeholders with confidence that the organization’s manager-leaders have implemented internationally accepted best practices.
The GDPR, which will apply from May 25, 2018, makes protection confidence even more pertinent. Although the GDPR does not mandate certification, ISO/IEC 27001 is a powerful way to demonstrate accountability and compliance. So while having ISO/IEC 27001 does not automatically make you compliant with GDPR, it is indeed putting the necessary structures in place to help you with compliance.
AREAS COVERED
Information is data interpretation presented in a form that furnishes value to a recipient. The General Data Protection Regulation was agreed upon by the European Parliament and Council in April 2016, replaces the Data Protection Directive 95/46/EC in May 2018 as the primary regulation on how companies should protect a European Union citizens' data. As an enforcable regulation, rather than a directive, the General Data Protection Regulation is a binding legislative act that applies across the European Union.
An increasing trend is adopting a holistic approach to managing information security risks. The assigned personnel, defined structures, designed processes -- with risk management integration -- are the crucial components of an effective information security management system. An information security management system is a management information system representing the aggregation of technological and organizational resources supporting data processing to produce information utilized for decision-making or problem-solving. Organizations typically implement an information security management system with specific objectives designed to inscribe best-practice external and internal business solutions. Consequently, organizational employees should be able to rely on their information security management system to reduce the risk of inappropriate responses to industry environmental conditions.
Areas covered in the session encompass:
  • An overview of the GDPR and how an ISO/IEC 27001-aligned information security management system can support compliance by discussing requirements, territorial reach, regulatory risks, and achieving objectives.
  • The primary risks associated with data breaches and critical actions in the event of a data breach that address validation, monitoring, and incident handling
  • The technical and organizational requirements to achieve GDPR compliance through policies, procedures, and technology.
  • The benefits of deploying an information security management system by providing how an information security management system reflects a holistic approach to managing information security – confidentiality, integrity, and availability of information and data.
  • Practical advice on how to improve your information security management system deployment congruent with the GDPR requirements.
LEARNING OBJECTIVES
In this webinar, information systems management expert Dr. Robert E. Davis, CISA, CICA will walk you through how to implement an effectiveinformation security management system configuration that can help you towards compliance with the new European Union regulations. You will take away from this session:
  • An overview of the GDPR
  • The purpose of the GDPR
  • Consequences of data breaches
  • The reach of the GDPR
  • How ISO/IEC 27001:2015 can help with GDPR compliance
  • How to map ISO/IEC 27001:2015 to the GDPR
  • ISO/IEC 27001:2015 implementation considerations
WHO WILL BENEFIT
Chief Information System Officers, Information Security Directors, Data governance and management professionals, Staff Attorneys, Privacy and Compliance Professionals, Human Resorce Professionals, Risk management professionals and Auditors tasked with compliance and risk transfer, Data Protection Officers, Chief Information Officers/Chief Technology Officers, Internal Audit Managers and Staff, Information Technology Security Officers, Information Technology and Data Consultants as well as project managers involved in data protection, information security or cybersecurity issues.
 
For more detail please click on this below link:
https://bit.ly/2rdUuOG
 
Email: support@trainingdoyens.com
Toll Free: +1-888-300-8494
Tel: +1-720-996-1616         
Fax: +1-888-909-1882
 
 
 

 


comments powered by Disqus
Create your own event
Turn your passion into a business.
Join our mailing list