Incident Response and GDPR. What You Need To Know.

Presented by

Amar Singh

About this talk

Warning - this is not just another GDPR webinar. Join Amar Singh in his popular and interactive webinars and deep-dive into this special Cyber Incident Planning & Response webinar where we share and discuss the following: * - What are the key components to automate in incident management to enable GDPR compliance. * - Four important questions a CISO or Manager must ask to manage an incident successfully. * - Understand Process Automation for Incident Orchestration. * - How you can, using the technology and processes, build a lean, effective and knowledge Security team with or without a Security Operations Centre. * - Data Protection and Incident Response for the non-technical manager. * - How and why it's critical that middle and senior management, working with technical teams, get involved in delivering effective cyber incident planning & response.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (1127)
Subscribers (13307)
The Information Security Careers Network is the largest group on LinkedIn dedicated to helping people further their careers in IT & Information Security. Due to our partnerships, we are able to offer discounts on some of the most popular security certifications and training courses, including CEH, CISSP, CCISO, and more. www.infosec-careers.com This BrightTALK channel is an extension of the group and the ISCN website (www.infosec-careers.com), featuring webinars, presentations and resources from some of the leading names in Information and IT Security to help you develop your knowledge and get the job you're after. Key areas: InfoSec, Risk, Cyber security, Identity & Access Management (IDM / IDAM), PCI / PA DSS QSA, Governance, Policy, ISO 27001 / ISO27001, CISSP, CCNA, C|CISO, CISM, CEH, CLAS, HMG, JSP440, JSP480, Network Intrusion Detection & Prevention (NIDS / IDS / IPS), Data Privacy & Protection, DLP, Data Loss / Leakage Prevention, Encryption, Cryptography, PKI, Penetration Testing, Ethical Hacking, Firewalls (Cisco, Checkpoint, Juniper, etc.), ITIL, HIPAA, and more