Scheduled to come into effect May 25, 2018, the General Data Protection Regulation (GDPR) has struck fear into compliance officers around the world. Much confusion surrounds this new regulation as organizations everywhere work to understand its new requirements and adjust business processes accordingly.
In this webinar, we review:
-- Key GDPR requirements
-- Data types regulated under GDPR
-- How GDPR impacts EU and non-EU businesses
-- Steps to becoming GDPR compliant
-- Consequences of non-compliance
-- How SecurityIQ helps you meet security awareness GPDR requirements
To learn more about SecurityIQ, visit: https://securityiq.infosecinstitute.com/
The EU’s General Data Protection Regulation (GDPR) takes effect on May 25, 2018. GDPR significantly increases the requirements imposed on companies touching the personal data of EU citizens, and also increases oversight by the EU member states’ data protection authorities. And the consequences of non-compliance under GDPR are massive—the greater of €20 million or four percent of the company’s worldwide turnover.
GDPR From Implementation to OpportunityDean Sappey
GDPR presents new challenges for law firms across Europe. This presentation explains the implications of GDPR and simple strategies to ensure firms are compliant for its launch in May 2018
General Data Protection Regulations (GDPR): Do you understand it and are you ...Cvent
Whether you’re an event or hospitality professional in a small, medium or large organization, the General Data Protection Regulation (GDPR) is going to affect you. Get prepared with Cvent and Debrah Harding of Market Research Society before the 25th May deadline. GDPR is a new EU regulation, designed for the digital age. GDPR will strengthen an individual's rights and increase business accountability for data privacy and holding personal information. Organizations found breaching the regulations can face fines of up to 20 million Euros or up to 4% of annual global turnover. At Cvent we are already on track to becoming GDPR compliant and we want to advise our industry partners on how to become compliant too.
How GDPR works : companies will be expected to be
fully compliant from 25 May 2018. The regulation
is intended to establish one single set of data
protection rules across Europe
The EU’s General Data Protection Regulation (GDPR) takes effect on May 25, 2018. GDPR significantly increases the requirements imposed on companies touching the personal data of EU citizens, and also increases oversight by the EU member states’ data protection authorities. And the consequences of non-compliance under GDPR are massive—the greater of €20 million or four percent of the company’s worldwide turnover.
GDPR From Implementation to OpportunityDean Sappey
GDPR presents new challenges for law firms across Europe. This presentation explains the implications of GDPR and simple strategies to ensure firms are compliant for its launch in May 2018
General Data Protection Regulations (GDPR): Do you understand it and are you ...Cvent
Whether you’re an event or hospitality professional in a small, medium or large organization, the General Data Protection Regulation (GDPR) is going to affect you. Get prepared with Cvent and Debrah Harding of Market Research Society before the 25th May deadline. GDPR is a new EU regulation, designed for the digital age. GDPR will strengthen an individual's rights and increase business accountability for data privacy and holding personal information. Organizations found breaching the regulations can face fines of up to 20 million Euros or up to 4% of annual global turnover. At Cvent we are already on track to becoming GDPR compliant and we want to advise our industry partners on how to become compliant too.
How GDPR works : companies will be expected to be
fully compliant from 25 May 2018. The regulation
is intended to establish one single set of data
protection rules across Europe
GDPR Guide: The ICO's 12 Recommended Steps To Take NowHackerOne
Recommendations from The United Kingdom's Information Commissioner's Office (ICO) to Prepare for May 2018.
The European General Data Protection Regulation, better known as GDPR, will take effect on May 25, 2018. When it does, every business, organization, or government agency that collects information on European Union (EU) citizens (in other words, just about everyone) will be forced to radically change how it manages customer data and security. If you don’t, the cost of noncompliance is significant: fines can reach up to €20M ($23.5M) or 4 percent of annual sales, whichever is higher.
GDPR The New Data Protection Law coming into effect May 2018. What does it me...eHealth Forum
GDPR The New Data Protection Law coming into effect May 2018. What does it mean for hospitals?
Anthe Papageorgiou, Compliance Officer & Data Protection Officer at Henry Dunant Hospital Center
What is the new data protection regulation GDPR and why should you care? Jesp...Exove
What is the new data protection regulation GDPR and why should you care? by Jesper Nevalainen, Bird & Bird
Exove and Bird & Bird seminar on Nov 23rd 2016: "GDPR - Practical Effects on Digital Business - juridical, technical, and customer point of view"
Presentation slides from an NCVO webinar which took place on 18 October 2017.
Presentation by Gary Shipsey from Protecture, find out more about Protecture: https://www.protecture.org.uk/
View the webinar recording: https://youtu.be/D7wuDS4QZgQ
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Qualsys Ltd
Preparing for the new General Data Protection Regulation? Here is a presentation to help you to engage your employees with their new information security requirements. In this ppt presentation, you will find out: why GDPR, steps to manage compliance, important information security facts and some of the key articles.
An Overview of the new GDPR regulations including:
• Data Protection Frame Work
• GDPR – Responsibilities
• GDPR – Changes
• GDPR - Exemptions
• GDPR – Rights
• Penalty
• Ten High Level Steps
General Data Protection Regulation (GDPR) - Moving from confusion to readinessOmo Osagiede
This GDPR primer highlights key aspects of the new EU regulation regarding the protection of EU citizens data. It also presents a basic approach and key activities for GDPR preparedness. Useful as a discussion starter with senior management.
EU General Data Protection Regulation - Update 2017Cliff Ashcroft
This free Lasa webinar looks at why data protection is important in a digital world, and what practical things charities and civil society organisations can do to prepare for when the EU General Data Protection Regulations come into force in May 2018.
It is vital charities use the next 12 months to understand their new responsibilities and put the required processes in place.
Our webinar gives you the opportunity to ensure you are prepared for what’s to come by putting your #GDPR questions to our data protection expert and published author, Paul Ticher.
Lasa does lots more charity tech help and advice - find out more at: Twitter: @lasaict
Acknowledgements:
Lasa actively promotes and supports the Way Ahead – Civil Society at the Heart of London. See www.citybridgetrust.org.uk/publications/way-ahead/
This webinar is supported by the City of London Corporation's charity, City Bridge Trust. www.citybridgetrust.org.uk
MWLUG - 2017
Tim Clark & Stephanie Heit
Tim & Steph explain the basics of GDPR and give some recommendations about what you can do to be ready.
Data sources are in the final slides.
For more information about how BCC can help you get your Domino data ready for GDPR please contact us here.
http://bcchub.com/bcc-domino-protect/
This is a slightly modified version of a presentation that I gave to fellow lawyers last week. It explains what GDPR is, the policy of data protection and the evolution of data protection legislation from the OECD Guidelines and Council of Europe Convention to the GDPR. It explores the regulation focusing on the data protection principles and, in particular, the lawfulness requirement and the validity of consent. The presentation mentions the Law enforcement data protection directive, the Data Protection Bill and the arrangements post Brexit. Finally, it considers the preparations recommended by the Information Commissioner for small busiesses
The GDPR (DSGVIO) is effective since 25th of May. This brief presentation about privacy law in Europe gives an overview to the GDPR (DSGVO) and and an outlook to privacy regulations.
(presentation from the 18th of June 2018 in "Factory Berlin".
This presentation was prepared to accompany my talk at Montreal All Girls Hack Night.
I think that Data and Privacy should be the foundation for all businesses moving forward to maintain a healthy Digital life for everyone.
General Data Protection Regulation plays a great role in to enforcing such acts that ensure Data Protection and Privacy of the users. GDPR is a very brief topic, but in this presentation I will share with you some core values of GDPR and some basic actions that you can take to make your business compliant to GDPR.
Note: This is not a legal advice. This information is collected from different resources. All the guides and resources used in the presentation are listed below.
Important Definitions and Notes from the presentation:
GDPR
The General Data Protection Regulation (GDPR) (EU) is a regulation in EU law on data protection and privacy for all individuals within the European Union (EU) and the European Economic Area (EEA).
GDPR Guide: The ICO's 12 Recommended Steps To Take NowHackerOne
Recommendations from The United Kingdom's Information Commissioner's Office (ICO) to Prepare for May 2018.
The European General Data Protection Regulation, better known as GDPR, will take effect on May 25, 2018. When it does, every business, organization, or government agency that collects information on European Union (EU) citizens (in other words, just about everyone) will be forced to radically change how it manages customer data and security. If you don’t, the cost of noncompliance is significant: fines can reach up to €20M ($23.5M) or 4 percent of annual sales, whichever is higher.
GDPR The New Data Protection Law coming into effect May 2018. What does it me...eHealth Forum
GDPR The New Data Protection Law coming into effect May 2018. What does it mean for hospitals?
Anthe Papageorgiou, Compliance Officer & Data Protection Officer at Henry Dunant Hospital Center
What is the new data protection regulation GDPR and why should you care? Jesp...Exove
What is the new data protection regulation GDPR and why should you care? by Jesper Nevalainen, Bird & Bird
Exove and Bird & Bird seminar on Nov 23rd 2016: "GDPR - Practical Effects on Digital Business - juridical, technical, and customer point of view"
Presentation slides from an NCVO webinar which took place on 18 October 2017.
Presentation by Gary Shipsey from Protecture, find out more about Protecture: https://www.protecture.org.uk/
View the webinar recording: https://youtu.be/D7wuDS4QZgQ
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Qualsys Ltd
Preparing for the new General Data Protection Regulation? Here is a presentation to help you to engage your employees with their new information security requirements. In this ppt presentation, you will find out: why GDPR, steps to manage compliance, important information security facts and some of the key articles.
An Overview of the new GDPR regulations including:
• Data Protection Frame Work
• GDPR – Responsibilities
• GDPR – Changes
• GDPR - Exemptions
• GDPR – Rights
• Penalty
• Ten High Level Steps
General Data Protection Regulation (GDPR) - Moving from confusion to readinessOmo Osagiede
This GDPR primer highlights key aspects of the new EU regulation regarding the protection of EU citizens data. It also presents a basic approach and key activities for GDPR preparedness. Useful as a discussion starter with senior management.
EU General Data Protection Regulation - Update 2017Cliff Ashcroft
This free Lasa webinar looks at why data protection is important in a digital world, and what practical things charities and civil society organisations can do to prepare for when the EU General Data Protection Regulations come into force in May 2018.
It is vital charities use the next 12 months to understand their new responsibilities and put the required processes in place.
Our webinar gives you the opportunity to ensure you are prepared for what’s to come by putting your #GDPR questions to our data protection expert and published author, Paul Ticher.
Lasa does lots more charity tech help and advice - find out more at: Twitter: @lasaict
Acknowledgements:
Lasa actively promotes and supports the Way Ahead – Civil Society at the Heart of London. See www.citybridgetrust.org.uk/publications/way-ahead/
This webinar is supported by the City of London Corporation's charity, City Bridge Trust. www.citybridgetrust.org.uk
MWLUG - 2017
Tim Clark & Stephanie Heit
Tim & Steph explain the basics of GDPR and give some recommendations about what you can do to be ready.
Data sources are in the final slides.
For more information about how BCC can help you get your Domino data ready for GDPR please contact us here.
http://bcchub.com/bcc-domino-protect/
This is a slightly modified version of a presentation that I gave to fellow lawyers last week. It explains what GDPR is, the policy of data protection and the evolution of data protection legislation from the OECD Guidelines and Council of Europe Convention to the GDPR. It explores the regulation focusing on the data protection principles and, in particular, the lawfulness requirement and the validity of consent. The presentation mentions the Law enforcement data protection directive, the Data Protection Bill and the arrangements post Brexit. Finally, it considers the preparations recommended by the Information Commissioner for small busiesses
The GDPR (DSGVIO) is effective since 25th of May. This brief presentation about privacy law in Europe gives an overview to the GDPR (DSGVO) and and an outlook to privacy regulations.
(presentation from the 18th of June 2018 in "Factory Berlin".
This presentation was prepared to accompany my talk at Montreal All Girls Hack Night.
I think that Data and Privacy should be the foundation for all businesses moving forward to maintain a healthy Digital life for everyone.
General Data Protection Regulation plays a great role in to enforcing such acts that ensure Data Protection and Privacy of the users. GDPR is a very brief topic, but in this presentation I will share with you some core values of GDPR and some basic actions that you can take to make your business compliant to GDPR.
Note: This is not a legal advice. This information is collected from different resources. All the guides and resources used in the presentation are listed below.
Important Definitions and Notes from the presentation:
GDPR
The General Data Protection Regulation (GDPR) (EU) is a regulation in EU law on data protection and privacy for all individuals within the European Union (EU) and the European Economic Area (EEA).
The European Union (EU) is implementing GDPR (General Data Protection Regulation) on May 25, 2018. Organizations who offer goods or services to EU residents or monitor the behavior of EU residents must comply, or they may incur significant financial penalties. Are you ready? Time is running out to ensure you comply with the new requirements.
In this webinar presentation, Dean Evans, Satori Consulting to learn what the GDPR requirements mean for your organization, plus get a practical guide to achieving GDPR readiness including how to implement processes to satisfy the privacy rights of individuals. Dean will cover:
=> What is GDPR?
=> Common GDPR misconceptions
=> Key considerations
=> How to develop a plan of action
=> Process owners as data stewards
Presentation -- GDPR Compliance: What Marketing Operations Need to Know (pptx)Macromator Inc.
Let's discuss quick wins and responsive actions that marketing operations departments need to be are of in respect to GDPR compliance.
If your MarTech stack is using tools like Marketo, Eloqua, Pardot, Marketing Cloud or Act-On and Salesforce, or Microsoft Dynamics, then this is info you need to know!
For more information visit https://www.brightpay.co.uk
The General Data Protection Regulation (GDPR) comes into effect on 25 May 2018 with the aim of protecting all EU citizens from privacy and data breaches in an increasingly data driven world.
Employers process large amounts of personal data, not least in relation to their customers and their own employees. Consequently, the GDPR will impact most if not all areas of the business and the impact it will have cannot be overstated.
In this webinar, we will peel back the legislation to outline clearly:
What is GDPR and why is it being implemented?
Why employers need to take it seriously
How to prepare for GDPR
How we are working to help you
LawBite is a UK-based online legal platform launched in 2013, headquartered in London. LawBite uses legal technology to streamline legal services for small and medium sized businesses (SMEs), providing access to legal document templates as well as a network of lawyers based in the UK and internationally.
The GDPR came into force on 25 May 2018. The changes that the GDPR makes to Data Protection legislation are far reaching and the GDPR introduces a number of new legal concepts.
The interactive webinar will provide you with details on the key changes that you need to be aware of under GDPR including:
1. Background to the GDPR
2. Key changes under GDPR
3. GDPR Data Protection Principles
4. Data Processing
5. Obtaining consent
6. Rights of data subjects
7. International data transfers
8. Data breaches
9. Data processors and data protection officers
10. What your organisation should be doing now
The webinar contains a 45 minute presentation with a Q&A at the end.
What's Next - General Data Protection Regulation (GDPR) ChangesOgilvy Consulting
The General Data Protection Regulation is the biggest change to the law on data in years. This webinar features Vicky Brown, Deputy General Counsel at WPP, and Paul King, Head of Data at OgilvyOne discussing what it is, why it matters and what companies are doing.
General Data Protection Regulation (GDPR) Implications for Canadian Firmsaccenture
The General Data Protection Regulation (GDPR) represents significant challenges for financial institutions to comply with the new data processing and record keeping requirements. This Accenture Finance & Risk presentation explores the impact of GDPR on Canadian firms, including lessons learned from our work with clients and knowledge gained that can be used for an effective GDPR journey.
When becoming GDPR compliant, what factors do you need to consider and what methods are you adhering to? This slide deck explores the challenges, best practices and a step-by-step approach to becoming GDPR compliant.
Data breaches, privacy programs and what will change for processorsExove
Data breaches, privacy programs and what will change for processors, Tobias Bräutigam, Bird & Bird
Exove and Bird & Bird seminar on Nov 23rd 2016: "GDPR - Practical Effects on Digital Business - juridical, technical, and customer point of view"
Teleran Data Protection - Addressing 5 Critical GDPR RequirementsChris Doolittle
Learn how to quickly and cost effectively meet 5 critical General Data Protection Regulation (GDPR) requirements for structured data with Teleran's Data Protection and Compliance solution. Teleran's solution addresses these key GDPR mandates: Impact Assessments, Purpose Limitation, Data Security, Accountability and Documentation, and Breach Notification. Teleran’s software solution delivers integrated sensitive data discovery, audit and controls. There is little time left to address GDPR. Flexibility, automation, integration and flexibility are key to getting there quickly and cost efficiently.
With the deadline for the General Data Protection Regulation, or GDPR, compliance looming (it takes effect May 25, 2018), it’s more important than ever to make sure you’re on board. Listen in to our webinar recording to understand how to make sure you're in full compliance.
Understand what GDPR is and how it affects US companies.
- Take the 3-Question Test to see if it really applies to you
- Follow a 4-part framework for updating your privacy policy
- Learn why your CRM may be a problem
- Get a full checklist on how to become compliant today
EMMA’s EMEA Regional Director Joseph Yammine explains how the EU’s General Data Protection Regulation applies to the Health Care Industry and how you can prepare your team to follow the regulation and avoid any data breaches.
GDPR what you should know and how to minimize impact on your businessOlivier BARROT
The upcoming General Data Protection Regulation (GDPR) that will be applicable to all data of EU citizens starting May 2018 enforces new data privacy obligations on the management and the retention of personally identifiable information (PII) including data collection, retention, protection, modification and deletion processes.
Learn what are the impacts on your business and how to prepare with IBM solutions
GDPR & the Travel Industry: Practical recommendations for holiday rental ownersSpain-Holiday.com
What is GDPR? As a holiday rental property owner, Airbnb host or holiday rental agent, why does it matter to you?
You don't need to work at a large internet company like Facebook, Google or Amazon to be affected, or responsible for data protection.
As part of the travel & tourism industry, you probably have personal data on your guests such as name and email address at the very least. You may also have highly sensitive data such as financial details, date of birth and passport details.
The introduction of the new privacy regulation called the GENERAL DATA PROTECTION REGULATION, or GDPR, comes into effect from 25th May 2018.
This webinar aims to help you understand what your obligation in how you deal with the data from the customers, the penalties and risks for non-compliance and, most importantly, a step by step roadmap to becoming GDPR compliant as a small business owner in the holiday rental industry.
Alongside tips and practical advice, the webinar will explore the opportunities that the introduction of the new data protection law can have for you in the travel & tourism industry.
The presentation agenda will cover:
Introduction and overview to GDPR
GDPR and the Holiday Rental Industry
GDPR and You - Responsibilities, risks and benefits
Roadmap to GDPR compliance
GDPR applies to all businesses and organisations, big or small, offering products or services to citizens in the EU. Show your customers that you are committed to treating their personal data with respect and consideration by understanding how to become GDPR-ready for 25th May 2018.
Similar to GDPR Compliance: What You Need to Know Before May 2018 (20)
AWS Certified DevOps Engineer: What it is and how to get certifiedInfosec
Watch the full webinar here: https://www.infosecinstitute.com/webinar/aws-certified-devops-engineer-what-it-is-and-how-to-get-certified/
Cloud infrastructure is the backbone of many organizations and services, and DevOps engineers are the professionals tasked with ensuring those systems are responsive, available, scalable and secure. The AWS Certified DevOps Engineer – Professional certification validates your skills in provisioning, operating and managing distributed AWS cloud systems.
Join us on March 27 at 11 a.m. Central to learn how this AWS certification can benefit your career — and what to expect in the first-ever live AWS boot camps from Infosec. In less than 30 minutes, you’ll learn:
- What’s on the AWS Certified DevOps Engineer exam (DOP-C02)
- Career paths AWS certification holders
- Ways you can train and get certified
- Plus Q&A from live attendees
AWS Cloud Operations Administrator: What it is and how to get certifiedInfosec
Watch the webinar here: https://www.infosecinstitute.com/webinar/aws-certified-sysops-administrator/
As the AWS cloud market continues to expand, professionals are needed to administer those systems. AWS Certified Cloud Operations Administrator training prepares you to earn your AWS Certified SysOps Administrator certification — and validates your skills in deploying, managing and operating AWS workloads.
Join us to learn how this AWS certification can benefit your IT and cybersecurity career — and what to expect in the first-ever live AWS boot camps from Infosec. In less than 30 minutes, you’ll learn:
- What’s on the AWS Certified Cloud Operations/SysOps Administrator exam (SOA-C02)
- Career paths AWS certification holders
- Ways you can train and get certified
AWS Certified Security - Specialty: What it is and how to get certifiedInfosec
Watch the webinar: https://www.infosecinstitute.com/webinar/aws-certified-security---specialty-what-it-is-and-how-to-get-certified/
Cloud security skills are among the most in-demand in 2024, and if you work in the cloud, there’s a good chance it involves AWS. The AWS Certified Security - Specialty certification validates your skills in creating and implementing AWS cloud security solutions.
Join us on March 13 at 11 a.m. Central to learn how this AWS certification can benefit your cybersecurity career — and what to expect in the first-ever live AWS boot camps from Infosec. In less than 30 minutes, you’ll learn:
- What’s on the AWS Certified Security exam (SCS-C02)
- Career paths AWS certification holders
- Ways you can train and get certified
- Plus Q&A from live attendees
Watch the webinar here: https://www.infosecinstitute.com/webinar/aws-certified-solutions-architect-what-it-is-and-how-to-get-certified/
Amazon Web Services (AWS) is the market leader for cloud infrastructure, and the AWS Certified Solutions Architect – Associate certification validates your knowledge and skills in designing secure, resilient, high-performing and cost-optimized architectures.
Join us to learn how this AWS certification can benefit your career — and what to expect in the first-ever live AWS boot camps from Infosec. In less than 30 minutes, you’ll learn:
What’s on the AWS Certified Solutions Architect exam (SOA-C02)
Career paths AWS certification holders
Ways you can train and get certified
This webcast is part of the Infosec AWS Training Series: https://www.infosecinstitute.com/resources/?q=aws&Type=Webcast+and+video
Infosec and AWS - A new way to train for your AWS certification (1).pptxInfosec
Watch the webinar: https://www.infosecinstitute.com/webinar/infosec-and-aws-a-new-way-to-train-for-your-aws-certification/
Amazon Web Services (AWS) certifications are some of the most pursued in the IT and cybersecurity industry, by both employers and professionals. And now, there’s a new way to train for them with Infosec.
Join us to learn about the new partnership between AWS and Infosec, making Infosec an authorized live boot camp training provider for AWS certifications. You’ll learn:
- How AWS certification can boost your career
- Which AWS certification is right for you
- How the new AWS live boot camps will work
- Plus Q&A from live attendees
This webcast is part of the Infosec AWS Training Series: https://www.infosecinstitute.com/resources/?q=aws&Type=Webcast+and+video
How AI and ChatGPT are changing cybersecurity forever.pptxInfosec
Watch the full webinar (and demo) here: https://www.infosecinstitute.com/webinar/how-chatgpt-and-ai-are-changing-cybersecurity-forever/
Artificial intelligence (AI) technologies are reshaping both how cybersecurity is done and how people learn cybersecurity. In this live demonstration, Infosec’s Keatron Evans will demonstrate how you can use ChatGPT to perform cybersecurity functions and teach yourself new skills — right now.
Join us on February 23 at 11 a.m. Central to get a practical, hands-on approach around how to use AI for your cybersecurity needs. You’ll learn:
- How malicious actors use AI tools like ChatGPT
- Ways for cybersecurity professionals to get started with AI
- How AI tools can help you learn quicker and better
- Plus Q&A from live attendees
2023.06 - CompTIA Security+ Everything you need to know about the new exam .pptxInfosec
Watch the webinar here: https://www.infosecinstitute.com/webinar/comptia-security-everything-you-need-to-know-about-the-sy0-701-update/
CompTIA’s Security+, the most popular cybersecurity certification in the world, is getting an overhaul! The updated exam (from SY0-601 to SY0-701) re-aligns the certification to match the most in-demand entry-level cybersecurity skills and trends heading into 2024.
Join Patrick Lane, Director of Certification Product Management at CompTIA, to learn how the Security+ certification is evolving so it remains the “go-to” certification for anyone trying to break into cybersecurity. You’ll learn about:
- Evolving Security+ domain areas and job skills
- Common job roles for Security+ holders
- SY0-601 and SY0-701 exam timelines
- Tips to pass the updated Security+ exam
- Plus Security+ questions from live viewers
Learn how to roll out a successful Cybersecurity Awareness Month program that boosts employee engagement all October (and beyond).
Join Infosec’s Emma Waite and Camille Raymond to learn:
- What employee-related risk data is needed to quantify success
- How to communicate your NCSAM plans to stakeholders
- The content and cadence appropriate to drive engagement
- Creative ways organizations are celebrating NCSAM
- How to continue the momentum after October
CompTIA CySA+ certification (CS0-003) changes: Everything you need to knowInfosec
Watch the webinar here: https://www.infosecinstitute.com/webinar/comptia-cysa-certification-changes-everything-you-need-to-know/
Information security analyst is one of the fastest-growing job categories in the U.S., with 35 percent overall growth expected by 2031. CompTIA’s Cybersecurity Analyst+ (CySA+) is one of the most popular certifications related to the role — and it’s getting an update in 2023 to align with the most in-demand knowledge and skills requested by employers.
Join Patrick Lane, Director of Certification Product Management at CompTIA, to learn everything you need to know about the latest CySA+ certification and exam (CS0-003) updates, including:
- Evolving security analyst job skills
- Common job roles for CySA+ holders
- What’s changed from CS0-002 to CS0-003
- Tips to pass the updated CySA+ exam
- Plus CySA+ questions from live viewers
Skills training value: How to differentiate your staff and your organization ...Infosec
Watch the full webinar here: https://event.on24.com/wcc/r/4125122/E0E3F3F43BABD48134E3909C4577F5EA
Hiring skilled people is hard. Once you get them, you want to retain them — and increase their value to your customers. Save your spot to learn more about:
- Challenges with getting and retaining internal talent
- How better skillsets affect margin/profitability
- Using Infosec Skills to attract highest-quality hires
- Using Infosec Skills to upskill your internal team
- Reselling Infosec Skills to your end-user
Learning ≠ Education: How people really learn and what it means for security ...Infosec
Emotion and passion are the two most essential elements in understanding how people learn. Often, the initial response to security threats is throwing technology at the problem. But as we know, you can’t fix all of your security issues without understanding the role humans play in the process.
Join Nick Shackleton-Jones — 30-year learning and development vet, Former CLO at Deloitte UK and CEO and Founder of Shackleton Consulting — to better understand:
- The difference between learning and education
- What really drives how employees learn
- How to develop a growth mindset that truly changes employee behavior
Watch the full webcast here: https://www.infosecinstitute.com/webinar/adult-learning-security/
Security awareness training - 4 topics that matter mostInfosec
National Cybersecurity Awareness Month (NCSAM) is right around the corner. Now’s the time to level up your security awareness training program — and instill best practices in employees that will help keep them (and your organization) secure year-round.
Join us to learn about the four key employee behaviors for NCSAM 2022. All registrants will receive a free Cybersecurity Awareness Month Toolkit, which includes:
1 training module & assessment
5 posters & infographics
1 employee presentation
4 email templates
And more
Join the hunt: Threat hunting for proactive cyber defense.pptxInfosec
As threat hunters, you already know staying ahead of the adversary demands a proactive approach to threat detection and response. Don your virtual threat hunting gear and join Infosec Principal Security Researcher Keatron Evans as he goes sleuthing for cyber threats.
Join us for practical threat hunting insights and career recommendations, including:
Threat hunting knowledge and skills to accelerate your career
How to help clients navigate the threat hunting toolbox and prioritize technology investments
Live demos of notoriously hard-to-detect adversarial behavior like memory-only malware and living-off-the-land techniques
One lucky attendee will win a free year of Infosec Skills. Complete the form to save your seat!
P.S. Don’t miss our novice-level threat hunting session: Threat hunting foundations: People, process and technology.
Threat hunting foundations: People, process and technology.pptxInfosec
Ever wonder what threat hunting is all about? Join Infosec Principal Security Researcher Keatron Evans as he breaks down the basics of what it’s like to have a career hunting down potential cyber threats.
Join us on for an inside look at a day in the life of a threat hunter, including:
Why threat hunters are more critical today than ever before
Knowledge and skills needed to drive threat hunting success
Live demos of essential threat hunting skills and tools used to detect and mitigate adversarial behavior
One lucky attendee will win a free year of Infosec Skills. Complete the form to save your seat!
P.S. Want to go even deeper into threat hunting? Don’t miss our advanced threat hunting session on June 28, Join the hunt: Threat hunting for proactive cyber defense.
It’s been more than a decade since Marc Andreessen popularized the idea that “every company needs to become a software company.” But in 2022, just being a software company isn’t enough; you need to become a secure software company.
That’s why Ted Harrington created a new Infosec Skills learning path based on his best-selling book, “Hackable: How to Do Application Security Right.” Whether you create code, secure systems or manage organizational risk, understanding application security has become a must-have skill. Join us to learn how to:
Avoid common application security mistakes
Implement best practices to secure software systems
Create the business case for security as a competitive edge
Plus, get your live questions answered by Ted
Every registrant will get a free copy of Ted’s new ebook, “How to secure your software faster and better.”
A public discussion about privacy careers: Training, certification and experi...Infosec
The word privacy can have so many meanings. Whether personal, professional or procedural, privacy can be a state of being, an action that requires compliance or a created space of safety.
Join Infosec Skills authors Chris Stevens, John Bandler and Ralph O’Brien as they discuss the intersection of privacy and cybersecurity. They’ll help you walk a path that will lead to an engaging career as a privacy specialist — a job role that grows with more opportunities year after year!
The panel will discuss:
Privacy as it relates to cybersecurity
Privacy certifications that align with your career path
Best practices for studying for IAPP certification exams
Tips for getting experience in the field of privacy
Interviewing for the privacy position you’ve been searching for
Plus your live questions on privacy as a career
Learn intrusion detection: Using Zeek and Elastic for incident responseInfosec
Intrusion detection is a foundational skill for many cybersecurity careers. Learn how intrusion detection works in action in this live webcast. Then take these free intrusion detection system (IDS) tools and start building your skills.
Join Infosec Skills author Mark Viglione on March 8 at 11 a.m. CST to learn all about:
What is intrusion detection?
How intrusion detection fits into different career paths
Live demo of Zeek for log analysis
Live demo of Elastic SIEM for incident response
Plus your live intrusion detection and career questions
There are 4.19 million cybersecurity professionals worldwide, but another 2.7 million are needed for organizations to adequately defend their critical assets, according to (ISC)². Learn how you can get started in cybersecurity and build a career in this lucrative and rewarding field.
CompTIA PenTest+: Everything you need to know about the examInfosec
Penetration testers find and report vulnerabilities before they can be exploited. CompTIA’s PenTest+ is one of the best certifications to validate those skills, and it’s being updated to align with the most up-to-date hacking and pentesting skills requested by employers in 2021.
CompTIA CASP+ | Everything you need to know about the new examInfosec
Want to be an advanced cybersecurity practitioner? Then CompTIA’s CASP+ certification may be the perfect fit for you. The popular certification is getting an overhaul heading into 2022 to ensure it validates the most relevant and in-demand skills — from security architecture and operations to engineering and governance.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
GDPR Compliance: What You Need to Know Before May 2018
1.
2.
3. Today
● What is the GDPR?
● Protected Data Types
● GDPR & Personal Data Rights
● GDPR Business Requirements
● Consequences of Non-Compliance
● 6 Steps to Becoming GDPR Compliant
● Personnel Training Requirements
4. What is GDPR?
The General Data Protection Regulation (GDPR):
● Defines personal and sensitive data
● Details how personal and sensitive data must be handled
● Establishes fines for noncompliance
● Sets new requirements for breach notifications
5. Protected Data Types
Personal Data
Information used to determine individual identities
Sensitive Personal Data
Special categories of personal data requiring strong
protections
6. Personal Data Rights for EU Citizens
1. Consent for personal
data to be shared and
processed
2. Access to personal data
3. Right to be forgotten
4. Right to portability
5. Right to rectification
7. GDPR Regulations Apply To
Data Processors
Entities processing data on behalf of the controller (Clouds)
Data Controllers
Entities deciding what personal data must be processed
and how processing will occur
8. Business Regulations for EU Organizations
EU organizations may need to:
● Appoint a data protection officer
● Review data collection procedures
● Create a data protection awareness program
● Perform ongoing information audits
● Complete Data Protection Impact Assessments
9. Business Regulations for Non-EU Organizations
Businesses with just one EU-
based client or employee are
subject to GPDR compliance
10. Consequences of Non-Compliance
Fine Amount Reasons
2% of annual global revenue, or €10 million
(whichever is higher)
● Data breaches
● Not employing the services of a DPO
● Not conducting a DPIA
● Not keeping appropriate records
4% of annual global revenue, or €20 million
(whichever is higher)
● Failing to gain consent
● Not upholding consumer rights under
GDPR rules
● Moving data outside the EU within the
confines of Chapter 5 of the GDPR
17. Other Impacts of Non-Compliance
● Cost of rectification
● Damaged company
reputation
● Lost consumer trust
● Declining share value
18. Employee Training Requirements
GDPR mandates:
● Awareness raising and training of staff involved in the processing
operations (Article 37)
● Appropriate data protection training to personnel having
permanent or regular access to personal data (Article 43)
19.
20. Meeting GDPR Compliance with SecurityIQ
Privacy & EU GDPR training module including:
● GDPR definition & purpose
● Protected data types
● Information lifecycle
● Non-compliance consequences
● Data protection principles
● Personal data rights
21.
22. Meeting GDPR Compliance with SecurityIQ
Role-based Training
Data protection principles exercise
Personal data lifecycle exercise
Data use exercises
Data disposal exercise
Engaging exercises,
animations, voice
narration for better
results
Comprehensive library
100+ phishing simulation templates
100+ security awareness modules
Editor's Notes
The General Data Protection Regulation (GDPR) evolved from its predecessor, the Data Protection Directive 95/46/EC.
GDPR is a fully fledged regulation for modern, cloud-based data transactions. It mandates specific controls over how personal data of EU citizens is handled and unifies privacy laws across EU states.
The GDPR covers two types of data, specified in the regulation as:
1. Personal Data
Personal data is information that can be used to determine individual identities. It can be thought of as an “identifier” used to directly or indirectly link data to individuals. This can include names, locations or online identifiers like IP addresses. It also includes economic, cultural or physiological data that could be linked together to determine individual identities.
2. Sensitive Personal Data
Sensitive personal data under the GDPR are special categories of personal data that require stronger protections. Sensitive personal data includes genetic data, biometric data and other data types that can reveal information such as religion, race or ethnic origin.
Consent for personal data to be shared and processed. The GDPR requires organizations to gain consent from individuals prior to data sharing and processing. Consent must be given in the form of a “clear affirmative act,” meaning consent must be expressly collected and demonstrated. Opt-out buttons are no longer allowed, and organizations must implement a mechanism to manage users’ revocations of consent.
Access to personal data. Individuals must be allowed to easily access their data collected and stored by organizations. The GDPR specifically states the “data subject should have the right of access to personal data which have been collected concerning him or her, and to exercise that right easily.”
Right to be forgotten. This is one of the most difficult-to-manage requirements of the GDPR. Under this directive, individuals must be able to remove all traces of their personal data from an organization if they wish. This would apply, for example, if the user removes consent to share.
Right to portability. The data subject must be allowed to transfer their data easily between controllers.
Right to rectification. The data subject must have the right to have inaccurate data rectified.
Appoint a Data Protection Officer (DPO).
Article 37 of the GDPR requires organizations to assign a DPO if the organization’s core activities involve either of the following:
Data processing requiring regular and systematic monitoring of individuals on a large scale.
Large-scale processing of special categories of data and personal data relating to criminal convictions.
A DPO has a number of duties, including balancing regulatory requirements with business processes, training staff on proper data handling and liaising with supervisory authorities.
Some organizations may be exempt from the DPO requirement if they do not handle personal data. Smaller organizations may also work with a consultant to remain in compliance without adding significantly to overhead.
Review data collection procedures for compliance with GDPR requirements.
This must include the entire lifecycle of data collection, storage, management, processing and data deletion/archival.
Create a data protection awareness program.
This will ensure staff members are aware of the various GDPR rules around data processing and breach notifications.
Perform ongoing information audits.
This step will ensure the organization knows what data is collected and how it is processed at all times.
Complete Data Protection Impact Assessments (DPIA).
Essentially, DPIAs are Privacy Impact Assessments. According to the GDPR, DPIAs will “evaluate, in particular, the origin, nature, particularity and severity” of the “risk to the rights and freedoms of natural persons.”
Noncompliance with GDPR carries more than a large fine. The GDPR is ultimately about protecting personal information. If you do not protect your customers’ personal information, you may also find there are other consequences. These include:
1. Cost of rectification. Data has intrinsic value to everyone. This includes your organization, your customers and cybercriminals. The Ponemon Institute values the average cost of rectification following a breach as $141 per record.
2. Damaged company reputation. If your company suffers a breach, you must notify supervisory authorities within 72 hours. If the breach is deemed high risk, you must also inform those impacted (your customers).
3. Lost consumer trust. Compensation claims and customer attrition could well outstrip noncompliance fines.
4. Declining share value. A study by Oxford Economics found share value can drop by 1.8 percent after a cyberattack.
Depending on the role of the employee, your training program should include the following topics:
● What is the purpose of the GDPR?
● What constitutes personal and sensitive personal data?
● What are the principles of the GDPR? Which Articles exemplify each principal?
● What are the roles of the processor, controller and DPO?
● What data does your organization need to collect? Why?
● How do the new consent rules affect your current data collection processes?
● What are the rights of the data subject?
● What types of breaches fall under GDPR notification requirements?
● What type of rules impact collection of data on children?
● Where and when can techniques like pseudonymization and anonymization be used?
SecurityIQ by InfoSec Institute helps you fulfill these personnel training requirements under GDPR. (articles 37 & 43)
It does this by integrating
Role-based security awareness training
Real-life phishing simulations
And automatically personalized learning plans for each employee
All into a single easy-to-use platform.
Our goal is to help you prevent data breaches by boosting your employees’ security aptitude and transforming their security behaviors.
With SecurityIQ, our clients have demonstrated drops in their phishing susceptibility rates to near 0%.
One of the ways SecurityIQ fulfills GDPR’s personnel training requirements is through our Privacy & EU GDPR training module which covers all the education components you see here.
Here’s a quick example of a GDPR training module
What our clients really appreciate with SecurityIQ is how it automates the often tedious program development and ongoing management of their security awareness initiatives.
What our clients really appreciate with SecurityIQ is how it automates the often tedious program development and ongoing management of their security awareness initiatives.
First of all, we provide them:
More than 130 frequently updated training modules
And over 200+ real-world phishing simulation templates
All ready to use out-of-the box or to customize as they needed
More importantly, SecurityIQ continually monitors and tracks employees’ learning progress and security behaviors. It uses this data to automatically create personalized security education experiences for each employee by providing the right level of training and reinforcement at the right time and frequency to keep them engaged and motivated.
I encourage you to give SecurityIQ a try and see for yourself. Simply go to securityiq.infosecinstitute.com to get started with a free account.