Training Course
Syllabus:
Organizations have until 25 May 2018 to comply with the European Union General Data Protection Regulation (GDPR). The GDPR encourages the use of certification schemes like International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 27001 to demonstrate the organization is actively managing data protection mechanisms in line with international best practice. By implementing ISO/IEC 27001, your organization is deploying an information security management system (ISMS) that enables support by top leadership; organizational culture and strategy integration, with constant monitoring, updating and review capabilities. Your organization will be able to ensure that the ISMS adapts to changes - both in the external and internal business environment- as well as identifies and reduces risks through using a process of continual improvement.
Objectives of the Presentation An overview of the GDPR The purpose of the GDPR Consequences of data breaches The reach of the GDPR How ISO/IEC 27001:2015 can help with GDPR compliance How to map ISO/IEC 27001:2015 to the GDPR ISO/IEC 27001:2015 implementation considerations
Why Should you Attend
Although many businesses understand the importance of implementing the right procedures to detect, report and investigate a data breach in compliance with the GDPR, not many are aware of the benefits of implementing ISO/IEC 27001 standards compliant with an ISMS deployment. ISO/IEC 27001 permits an excellent starting point for achieving the technical and operational requirements necessary to assist in preventing a data breach under the GDPR. In this webinar, information systems management expert Dr. Robert E. Davis, CISA, CICA will walk you through how to implement an effective ISMS configuration that can help you towards compliance with the new European Union regulations. Areas Covered
An overview of the GDPR and how an ISO/IEC 27001-aligned ISMS can support compliance The primary risks associated with data breaches and critical actions in the event of a data breach The technical and organizational requirements to achieve GDPR compliance The benefits of implementing an ISMS Practical advice on how to improve your ISMS deployment congruent with the GDPR requirements |