Most governments have already created, or are in the process of creating, regulations that impose conditions on the safeguard and use of Personally Identifiable Information (PII), with penalties for organizations who fail to sufficiently protect it. Organizations need to treat privacy as both a compliance and business risk issue, in order to reduce regulatory sanctions as well as reputational damage and loss of customers due to privacy breaches.
So how will organisations manage infrastructure across multiple domains without falling foul of emerging privacy and data management legislation, particularly when cloud services and personal devices are the norm?
During this webinar, Steve Durbin, Managing Director of ISF, will discuss how the security function and the board will need to work together to ensure that current regulatory trends and emerging technologies are aligned to maintain business effectiveness and connectivity.
Doing business in the European Union is changing. By May 2018, companies must comply with the new General Data Protection Regulation’s (GDPR) data breach notification requirements and the Network and Information Security (NIS) Directive’s security incident notification requirements.
Notification requirements make it imperative to prevent incidents before they happen. To help you prepare for these new requirements, Palo Alto Networks is hosting a webinar with cybersecurity and data privacy lawyers from Orrick Herrington & Sutcliffe to discuss:
· What are the requirements and the deadlines under each law?
· What are the thresholds for notification, and who needs to be notified?
· How should companies prepare for their oncoming obligations? What strategies should be in place? What have other international companies done to prepare and communicate?
· What might be the legal consequences of non-compliance?
This webcast will consist of a short presentation followed by a panel discussion with a range of subject matter experts.
New EU data protection legislation includes some significant changes like defining a data breach to include data destruction, adding the right to be forgotten, adopting the U.S. practice of breach notifications, and many other new elements. Another major change is a shift from a directive to a rule, which means the protections are the same for all 27 countries and includes significant financial penalties for infractions. This webcast will explore the new EU data protection legislation and highlight the elements that could have significant impacts on data handling practices.
There has significant media coverage on the Network Information Security Directive and the revision to the General Data Protection Regulation, in this session we will cover the realities. When do they come into effect, what are the key aspected you should be aware of and more critically how will they impact your cyber security strategies. This session will give you a practical insight to ensure your cyber strategy is aligned with the new legislation.Read more >
Governments across the globe are proposing and enacting strong data privacy and data protection regulations by mandating frameworks that include noteworthy changes like defining a data breach to include data destruction, adding the right to be forgotten, mandating the practice of breach notifications, and many other new elements. The implications of this and other proposed legislation on how the cloud can be utilized for storing data are significant. Join this live Webcast to hear:
•EU “directives” vs. “regulation”
•General data protection regulation summary
•How personal data has been redefined
•Substantial financial penalties for non-compliance
•Impact on data protection in the cloud
•How to prepare now for impending changes
Cybersecurity legislation and related issues received unprecedented attention in President Obama’s 2015 State of the Union address, but what does this legislative agenda mean for businesses? Will your organization’s IT security strategy be impacted? Ahead of the Summit on Cybersecurity and Consumer Protection at Stanford on February 13, security expert Stephen Cobb offers answers to these questions and his perspective on cybercrime deterrence.
Category: Research Overview
The new regulations that have been released have been a cause for worry by many a financial institution. From PSD2 to MIFID II, attend this panel session where our experts will make sure you aren't left in the dust regarding all the new directives that may affect the way you do business.
The panel will discuss:
• The Difference in Regtech implementation for startup firms and institutional financial firms
· In which direction should efforts be implemented to ensure collaboration is best supported between various parties involved and interested in RegTech
• Leveraging technology and resources to automate the regulatory process by incorporating regulatory requirements into technology protocols.
• In-built review process for continual assessment of data and analytics
• Technology awareness of the regulator
• Existing regulatory rules, policies and guidance restricting innovation and the adoption of RegTech solutions
Dr Lesley Sloss presents the findings of her latest reportRead more >