Successfully reported this slideshow.
Your SlideShare is downloading. ×

An Essential Guide to EU GDPR

An Essential Guide to EU GDPR

Download to read offline

GDPR is the most significant change to data protection in a generation and an imminent global issue that will dominate data privacy, management and regulation discussions in 2017. According to recent research, over half of businesses lack preparedness for GDPR. With a quarter of the EU’s grace period over and with fines of up to €20 million (or 4% of global turnover), there is a lot at stake for companies falling behind the May 2018 deadline. So, where do you start?

Join renowned information security consultant and GDPR expert, Brian Honan, along with Tim Erlin, Senior Director, Security and IT Risk Strategist at Tripwire as they walk you through the essential steps to accelerate your GDPR preparedness.

In this session you will learn:
• The key facts about the GDPR regulations
• The implications of the new rules and how they will impact your business
• Practical steps your business can take to prepare
• How your existing security frameworks (ISO/NIST/CSC) can help set the foundation
• How Tripwire can help

GDPR is the most significant change to data protection in a generation and an imminent global issue that will dominate data privacy, management and regulation discussions in 2017. According to recent research, over half of businesses lack preparedness for GDPR. With a quarter of the EU’s grace period over and with fines of up to €20 million (or 4% of global turnover), there is a lot at stake for companies falling behind the May 2018 deadline. So, where do you start?

Join renowned information security consultant and GDPR expert, Brian Honan, along with Tim Erlin, Senior Director, Security and IT Risk Strategist at Tripwire as they walk you through the essential steps to accelerate your GDPR preparedness.

In this session you will learn:
• The key facts about the GDPR regulations
• The implications of the new rules and how they will impact your business
• Practical steps your business can take to prepare
• How your existing security frameworks (ISO/NIST/CSC) can help set the foundation
• How Tripwire can help

More Related Content

Related Books

Free with a 30 day trial from Scribd

See all

Related Audiobooks

Free with a 30 day trial from Scribd

See all

Editor's Notes



  • PURPOSE = purpose of meeting & decisions to be made by end of conversation

    SALES REP AGENDA = goals & questions, challenges, actions results

    PROSPECT AGENDA = embed objections, use 3rd party stories

    TIME = confirm time available

    OUTCOME = proceed or stop the selling process, clear yes or no outcome
  • Most people know us for File Integrity Monitoring – this was our first product and we are still the best in the industry at detecting integrity changes and not just on files

    We’ve added configuration and policy management to our core capability to make it more robust and useful, and added automation to reduce the workload associated with compliance management

    We added log management capabilities to make sense of the data generated by your operations

    And we acquired technology that helps you identify the biggest risks on your network, with the industry’s most precise risk scoring algorithm so you can set actionable priorities

    We’ve integrated all these capabilities to work together seamlessly for real risk reduction

    And finally we have an open architecture so we can exchange our unique asset state data with many of the most used vendors in the IT security and operations space

  • Most people know us for File Integrity Monitoring – this was our first product and we are still the best in the industry at detecting integrity changes and not just on files

    We’ve added configuration and policy management to our core capability to make it more robust and useful, and added automation to reduce the workload associated with compliance management

    We added log management capabilities to make sense of the data generated by your operations

    And we acquired technology that helps you identify the biggest risks on your network, with the industry’s most precise risk scoring algorithm so you can set actionable priorities

    We’ve integrated all these capabilities to work together seamlessly for real risk reduction

    And finally we have an open architecture so we can exchange our unique asset state data with many of the most used vendors in the IT security and operations space

×