Security Webinar: Think GDPR Doesn't Impact You? Think Again...

What is 'GDPR' and Why You Need to Know?

WIN A $300 Amazon Gift Card

Register to WIN an R2D2 App-Enabled Drone!

*Must be in live attendance to qualify. Winner will be announced live by the moderator.

What You Need to Know

Companies across the globe are scrambling to meet the new compliance directives that are imposed by the European Union’s General Data Protection Regulation (GDPR) set to go into effect in 2018. If you’re thinking, “I’m not in the EU, so it doesn’t matter”, think again. For many organizations, GDPR compliance extends outside the boundaries of the EU and the law’s impact will reach across continents, to include companies in the US.

There are a number of questions that people have around whether or not they need to comply with the new GDPR regulations, and if so, what, exactly, needs to be done? For companies that monitor, store, service, or process personally identifiable information an EU citizen or for those that process data while offering goods or services to data subjects who are in the EU, GDPR compliance is mandatory. For others, it’s critical to understand the law’s potential impact.

In a world of BYOD, cloud, mobility, and IoT, where personal data is more freely transferred and more highly valued than ever, new data protection mechanisms are a must. Whether or not you’re facing a GDPR compliance requirement, protecting critical data requires a combination of encryption and segmentation as well as the ability to identify, monitor and audit access to the data.

In this webinar, we will help lay the groundwork for a plan to comply by the 2018 deadline and, even if you aren’t subject to GDPR, we’ll share useful steps you can take to increase your information security posture. We’ll also cover the vital role security management plays in protecting data from the start, not as an afterthought.

Scott D. Lowe

Scott D. Lowe

Partner, ActualTech Media

Tim Woods

Tim Woods

Vice President of Technology, FireMon

You will learn about:

  • Analysis of traffic to and from network segments
  • Assessments to help remove unnecessary or inadvertent access
  • Real-time, automated change alerts and workflows
  • Automated documentation
  • Threat detection and investigation