SlideShare a Scribd company logo
The Impact of the General Data
Protection Regulation
10th May, University of Nottingham
Welcome
• Welcome and Housekeeping – University of Nottingham
• Introduction to the Partners in EMCSF:
o Qonex
o East Midlands Chamber (Derbyshire, Nottinghamshire, Leicestershire)
o Institute of Information Security Professionals (IISP)
o UK Cyber Security Forum
• Programme for the evening
East Midlands Chamber
• c4000 members across Derbys, Notts & Leics
–Largest business support organisation in East Midlands
–2nd largest Chamber UK
• A voice for business
• Supporting business
–Events & Networking
–International Trade
–Training & Recruitment
–HR/Legal Advice
East Midlands Chamber
Business Security
• Bringing businesses together to
–help themselves
–share best practice
• Source of Security Advice
• Seminars, Workshops and Conferences
Institute of Information Security
Professionals (IISP)
• Professional body for those working in the
cyber security sector
• Individual and company membership
• Offers career progression, access to
resources, events and publications
• East Midlands branch run by Nexor
• Run a series of events – presentations and
networking
Developing strategies to prevent
cyber-attacks causing harm
CyberSecurityStrategy Security Assessment
Security Management
Systems
Countermeasures
Technology Solutions
Security Testing
Cyber Essentials
Security Training
Risk & Threat Assessment
Standards Compliance
Partners
}
Our Services:
UK Cyber Security Forum
• Represents small companies who are
actively working in cyber security across
the UK
• Completely free to join
• Has over 500 members across the
country
• East Midlands cluster hosted by Nexor
Programme for tonight
• Welcome and Introductions
• Be careful what you wish for: the great Data Protection law reform
Lilian Edwards, University of Strathclyde
• Break
• The new Regulation: are you ready?
Helena Wootton, Browne Jacobson
The Impact of the General Data
Protection Regulation
10th May, University of Nottingham
Cyber Security conference
11th July 2016
National Space Centre, Leicester
• Exhibition & Conference, featuring:
–Keynote presentations from industry leaders
–Product Showcases
–Training sessions
Next East Midlands Cyber
Security Forum event
• We are looking to hold our next
EMCSF event in October
• Aim is for event every 3
months approximately
• Alternating between
Nottingham and Leicester
The Impact of the General Data
Protection Regulation
10th May, University of Nottingham

More Related Content

What's hot

Giving culture a helping hand: National Library of Scotland metadata and digi...
Giving culture a helping hand: National Library of Scotland metadata and digi...Giving culture a helping hand: National Library of Scotland metadata and digi...
Giving culture a helping hand: National Library of Scotland metadata and digi...
Gill Hamilton
 
Expand your professional network with iabc 2016 v2
Expand your professional network with iabc 2016 v2Expand your professional network with iabc 2016 v2
Expand your professional network with iabc 2016 v2
Denitsa Gospodinova
 
About European Open Science Cloud
About European Open Science CloudAbout European Open Science Cloud
About European Open Science Cloud
Jisc
 
Workshop 11 - Europe - Niall Kearney
Workshop 11 - Europe - Niall Kearney Workshop 11 - Europe - Niall Kearney
Workshop 11 - Europe - Niall Kearney
Restorative Justice Council
 
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...
TCI Network
 
An overview of the Joint Security and Resilience Centre
An overview of the Joint Security and Resilience CentreAn overview of the Joint Security and Resilience Centre
An overview of the Joint Security and Resilience Centre
Defence and Security Accelerator
 
GDPR and EA - Commissioning a web site
GDPR and EA - Commissioning a web siteGDPR and EA - Commissioning a web site
GDPR and EA - Commissioning a web site
Allen Woods
 
Rosalie hoskins digital financial sustainability
Rosalie hoskins digital financial sustainabilityRosalie hoskins digital financial sustainability
Rosalie hoskins digital financial sustainability
TheFuseBox
 
KTN funding opportunities & networking events
KTN funding opportunities & networking eventsKTN funding opportunities & networking events
KTN funding opportunities & networking events
Duncan Purves
 
Copy of a presentation given by Professor Sir Nigel Shadbolt
Copy of a presentation given by Professor Sir Nigel Shadbolt Copy of a presentation given by Professor Sir Nigel Shadbolt
Copy of a presentation given by Professor Sir Nigel Shadbolt
Ben Proctor
 
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Defence and Security Accelerator
 
Accelerator autonomous last mile resupply - how to work with the Accelerator
Accelerator autonomous last mile resupply - how to work with the AcceleratorAccelerator autonomous last mile resupply - how to work with the Accelerator
Accelerator autonomous last mile resupply - how to work with the Accelerator
Heather-Fiona Egan
 
Introduction to Networkshop - Networkshop44 2016
Introduction to Networkshop - Networkshop44 2016Introduction to Networkshop - Networkshop44 2016
Introduction to Networkshop - Networkshop44 2016
Jisc
 
Cetis and OER, SLA SIG
Cetis and OER, SLA SIGCetis and OER, SLA SIG
Cetis and OER, SLA SIG
Lorna Campbell
 
Vis Moot in University of Georgia (Tbilisi)
Vis Moot in University of Georgia (Tbilisi)Vis Moot in University of Georgia (Tbilisi)
Vis Moot in University of Georgia (Tbilisi)
Jaba Gvelebiani
 
Stakeholder forum 2015 - Engaging across the uk - Robert Haymon-Collins
Stakeholder forum 2015 - Engaging across the uk - Robert Haymon-CollinsStakeholder forum 2015 - Engaging across the uk - Robert Haymon-Collins
Stakeholder forum 2015 - Engaging across the uk - Robert Haymon-Collins
Jisc
 
Immerse UK Presentation - Immersive Experiences briefing London
Immerse UK Presentation - Immersive Experiences briefing LondonImmerse UK Presentation - Immersive Experiences briefing London
Immerse UK Presentation - Immersive Experiences briefing London
Creative Economy Programme
 
18 November 2014: Knowledge Transfer Network
18 November 2014: Knowledge Transfer Network18 November 2014: Knowledge Transfer Network
18 November 2014: Knowledge Transfer Network
Defence and Security Accelerator
 
Stakeholder forum 2015 - 2015 and beyond - Martyn Harrow
Stakeholder forum 2015 - 2015 and beyond - Martyn HarrowStakeholder forum 2015 - 2015 and beyond - Martyn Harrow
Stakeholder forum 2015 - 2015 and beyond - Martyn Harrow
Jisc
 

What's hot (20)

Giving culture a helping hand: National Library of Scotland metadata and digi...
Giving culture a helping hand: National Library of Scotland metadata and digi...Giving culture a helping hand: National Library of Scotland metadata and digi...
Giving culture a helping hand: National Library of Scotland metadata and digi...
 
Expand your professional network with iabc 2016 v2
Expand your professional network with iabc 2016 v2Expand your professional network with iabc 2016 v2
Expand your professional network with iabc 2016 v2
 
PrivacyOS
PrivacyOSPrivacyOS
PrivacyOS
 
About European Open Science Cloud
About European Open Science CloudAbout European Open Science Cloud
About European Open Science Cloud
 
Workshop 11 - Europe - Niall Kearney
Workshop 11 - Europe - Niall Kearney Workshop 11 - Europe - Niall Kearney
Workshop 11 - Europe - Niall Kearney
 
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...
 
An overview of the Joint Security and Resilience Centre
An overview of the Joint Security and Resilience CentreAn overview of the Joint Security and Resilience Centre
An overview of the Joint Security and Resilience Centre
 
GDPR and EA - Commissioning a web site
GDPR and EA - Commissioning a web siteGDPR and EA - Commissioning a web site
GDPR and EA - Commissioning a web site
 
Rosalie hoskins digital financial sustainability
Rosalie hoskins digital financial sustainabilityRosalie hoskins digital financial sustainability
Rosalie hoskins digital financial sustainability
 
KTN funding opportunities & networking events
KTN funding opportunities & networking eventsKTN funding opportunities & networking events
KTN funding opportunities & networking events
 
Copy of a presentation given by Professor Sir Nigel Shadbolt
Copy of a presentation given by Professor Sir Nigel Shadbolt Copy of a presentation given by Professor Sir Nigel Shadbolt
Copy of a presentation given by Professor Sir Nigel Shadbolt
 
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...
 
Accelerator autonomous last mile resupply - how to work with the Accelerator
Accelerator autonomous last mile resupply - how to work with the AcceleratorAccelerator autonomous last mile resupply - how to work with the Accelerator
Accelerator autonomous last mile resupply - how to work with the Accelerator
 
Introduction to Networkshop - Networkshop44 2016
Introduction to Networkshop - Networkshop44 2016Introduction to Networkshop - Networkshop44 2016
Introduction to Networkshop - Networkshop44 2016
 
Cetis and OER, SLA SIG
Cetis and OER, SLA SIGCetis and OER, SLA SIG
Cetis and OER, SLA SIG
 
Vis Moot in University of Georgia (Tbilisi)
Vis Moot in University of Georgia (Tbilisi)Vis Moot in University of Georgia (Tbilisi)
Vis Moot in University of Georgia (Tbilisi)
 
Stakeholder forum 2015 - Engaging across the uk - Robert Haymon-Collins
Stakeholder forum 2015 - Engaging across the uk - Robert Haymon-CollinsStakeholder forum 2015 - Engaging across the uk - Robert Haymon-Collins
Stakeholder forum 2015 - Engaging across the uk - Robert Haymon-Collins
 
Immerse UK Presentation - Immersive Experiences briefing London
Immerse UK Presentation - Immersive Experiences briefing LondonImmerse UK Presentation - Immersive Experiences briefing London
Immerse UK Presentation - Immersive Experiences briefing London
 
18 November 2014: Knowledge Transfer Network
18 November 2014: Knowledge Transfer Network18 November 2014: Knowledge Transfer Network
18 November 2014: Knowledge Transfer Network
 
Stakeholder forum 2015 - 2015 and beyond - Martyn Harrow
Stakeholder forum 2015 - 2015 and beyond - Martyn HarrowStakeholder forum 2015 - 2015 and beyond - Martyn Harrow
Stakeholder forum 2015 - 2015 and beyond - Martyn Harrow
 

Viewers also liked

Ransomware - Mark Chimely
Ransomware - Mark ChimelyRansomware - Mark Chimely
Ransomware - Mark Chimely
IISPEastMids
 
How to avoid becoming the next victim of ransomware
How to avoid becoming the next victim of ransomwareHow to avoid becoming the next victim of ransomware
How to avoid becoming the next victim of ransomware
IISPEastMids
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...
IISPEastMids
 
Qonex - Securing the IoT
Qonex - Securing the IoTQonex - Securing the IoT
Qonex - Securing the IoT
IISPEastMids
 
General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...
IISPEastMids
 
IISP East Midlands Sept 2014 - Jim Shields presentation
IISP East Midlands Sept 2014 - Jim Shields presentationIISP East Midlands Sept 2014 - Jim Shields presentation
IISP East Midlands Sept 2014 - Jim Shields presentation
IISPEastMids
 
Managing and insuring cyber risk - a risk perspective
Managing and insuring cyber risk - a risk perspectiveManaging and insuring cyber risk - a risk perspective
Managing and insuring cyber risk - a risk perspective
IISPEastMids
 
Econocom - identifying funding for success
Econocom - identifying funding for successEconocom - identifying funding for success
Econocom - identifying funding for success
IISPEastMids
 
Governance - the Role of the Board
Governance - the Role of the BoardGovernance - the Role of the Board
Governance - the Role of the Board
Qonex
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
East Midlands Cyber Security Forum
 
Mike Gillespie - The Internet of Everything
Mike Gillespie - The Internet of Everything Mike Gillespie - The Internet of Everything
Mike Gillespie - The Internet of Everything
IISPEastMids
 
Redscan - Insider threat case study
Redscan - Insider threat case studyRedscan - Insider threat case study
Redscan - Insider threat case study
IISPEastMids
 
Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways
IISPEastMids
 
Achieving Cyber Essentials
Achieving Cyber Essentials Achieving Cyber Essentials
Achieving Cyber Essentials
Qonex
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policies
IISPEastMids
 
Trustworthy Software
Trustworthy SoftwareTrustworthy Software
Trustworthy Software
Qonex
 
Mitigation starts now
Mitigation starts nowMitigation starts now
Mitigation starts now
Jisc
 
Information Security in AWS - Dave Walker
Information Security in AWS - Dave WalkerInformation Security in AWS - Dave Walker
Information Security in AWS - Dave Walker
East Midlands Cyber Security Forum
 
Data Breaches and the EU GDPR
Data Breaches and the EU GDPRData Breaches and the EU GDPR
Data Breaches and the EU GDPR
IT Governance Ltd
 
EU General Data Protection Regulation & Transborder Information Flow
EU General Data Protection Regulation & Transborder Information FlowEU General Data Protection Regulation & Transborder Information Flow
EU General Data Protection Regulation & Transborder Information Flow
David Erdos
 

Viewers also liked (20)

Ransomware - Mark Chimely
Ransomware - Mark ChimelyRansomware - Mark Chimely
Ransomware - Mark Chimely
 
How to avoid becoming the next victim of ransomware
How to avoid becoming the next victim of ransomwareHow to avoid becoming the next victim of ransomware
How to avoid becoming the next victim of ransomware
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...
 
Qonex - Securing the IoT
Qonex - Securing the IoTQonex - Securing the IoT
Qonex - Securing the IoT
 
General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...
 
IISP East Midlands Sept 2014 - Jim Shields presentation
IISP East Midlands Sept 2014 - Jim Shields presentationIISP East Midlands Sept 2014 - Jim Shields presentation
IISP East Midlands Sept 2014 - Jim Shields presentation
 
Managing and insuring cyber risk - a risk perspective
Managing and insuring cyber risk - a risk perspectiveManaging and insuring cyber risk - a risk perspective
Managing and insuring cyber risk - a risk perspective
 
Econocom - identifying funding for success
Econocom - identifying funding for successEconocom - identifying funding for success
Econocom - identifying funding for success
 
Governance - the Role of the Board
Governance - the Role of the BoardGovernance - the Role of the Board
Governance - the Role of the Board
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
Mike Gillespie - The Internet of Everything
Mike Gillespie - The Internet of Everything Mike Gillespie - The Internet of Everything
Mike Gillespie - The Internet of Everything
 
Redscan - Insider threat case study
Redscan - Insider threat case studyRedscan - Insider threat case study
Redscan - Insider threat case study
 
Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways
 
Achieving Cyber Essentials
Achieving Cyber Essentials Achieving Cyber Essentials
Achieving Cyber Essentials
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policies
 
Trustworthy Software
Trustworthy SoftwareTrustworthy Software
Trustworthy Software
 
Mitigation starts now
Mitigation starts nowMitigation starts now
Mitigation starts now
 
Information Security in AWS - Dave Walker
Information Security in AWS - Dave WalkerInformation Security in AWS - Dave Walker
Information Security in AWS - Dave Walker
 
Data Breaches and the EU GDPR
Data Breaches and the EU GDPRData Breaches and the EU GDPR
Data Breaches and the EU GDPR
 
EU General Data Protection Regulation & Transborder Information Flow
EU General Data Protection Regulation & Transborder Information FlowEU General Data Protection Regulation & Transborder Information Flow
EU General Data Protection Regulation & Transborder Information Flow
 

Similar to The Impact of the General Data Protection Regulation - 10th May 2016

NWCSC March 2022 event.pptx
NWCSC March 2022 event.pptxNWCSC March 2022 event.pptx
NWCSC March 2022 event.pptx
Cyber Security Partners
 
How to cyber protect your business for free
How to cyber protect your business for freeHow to cyber protect your business for free
How to cyber protect your business for free
Cyber Security Partners
 
NWCSC Manchester region event
NWCSC Manchester region event NWCSC Manchester region event
NWCSC Manchester region event
Cyber Security Partners
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016
Dale Butler
 
The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...
The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...
The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...
APNIC
 
Continuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security FrameworkContinuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security Framework
QuEST Forum
 
DASA: FASS 2: Overview of DASA
DASA: FASS 2: Overview of DASADASA: FASS 2: Overview of DASA
DASA: FASS 2: Overview of DASA
Heather-Fiona Egan
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
vngundi
 
APNIC Update, APEC TEL 54
APNIC Update, APEC TEL 54APNIC Update, APEC TEL 54
APNIC Update, APEC TEL 54
APNIC
 
Opening plenary session - Day one Networkshop46
Opening plenary session - Day one Networkshop46Opening plenary session - Day one Networkshop46
Opening plenary session - Day one Networkshop46
Jisc
 
Oxford cluster overview 160414
Oxford cluster overview 160414Oxford cluster overview 160414
Oxford cluster overview 160414
Stewart Benger
 
Enhancing security incident response capabilities in the AP
Enhancing security incident response capabilities in the AP Enhancing security incident response capabilities in the AP
Enhancing security incident response capabilities in the AP
APNIC
 
Isoc bishkek 2015 11-25
Isoc bishkek 2015 11-25Isoc bishkek 2015 11-25
Isoc bishkek 2015 11-25
ISOC-KG
 
Enterprise Europe Network - Chris Lyons
Enterprise Europe Network - Chris Lyons Enterprise Europe Network - Chris Lyons
Enterprise Europe Network - Chris Lyons
The Future Economy Network
 
ISCR2013
ISCR2013ISCR2013
ISCR2013
APNIC
 
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LV
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LVDSS ITSEC 2013 Conference 07.11.2013 - CERT.LV
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LV
Andris Soroka
 
Accelerator Autonomous Last Mile Resupply - DASA overview
Accelerator Autonomous Last Mile Resupply - DASA overviewAccelerator Autonomous Last Mile Resupply - DASA overview
Accelerator Autonomous Last Mile Resupply - DASA overview
Heather-Fiona Egan
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTHAwais Shibli
 
Ict Hub For Rural Orgs
Ict Hub For Rural OrgsIct Hub For Rural Orgs
Ict Hub For Rural Orgs
Julie Hawker
 
Browne Jacobson LLP Jon Snade - London Tech Week
Browne Jacobson LLP Jon Snade - London Tech WeekBrowne Jacobson LLP Jon Snade - London Tech Week
Browne Jacobson LLP Jon Snade - London Tech Week
Browne Jacobson LLP
 

Similar to The Impact of the General Data Protection Regulation - 10th May 2016 (20)

NWCSC March 2022 event.pptx
NWCSC March 2022 event.pptxNWCSC March 2022 event.pptx
NWCSC March 2022 event.pptx
 
How to cyber protect your business for free
How to cyber protect your business for freeHow to cyber protect your business for free
How to cyber protect your business for free
 
NWCSC Manchester region event
NWCSC Manchester region event NWCSC Manchester region event
NWCSC Manchester region event
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016
 
The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...
The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...
The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...
 
Continuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security FrameworkContinuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security Framework
 
DASA: FASS 2: Overview of DASA
DASA: FASS 2: Overview of DASADASA: FASS 2: Overview of DASA
DASA: FASS 2: Overview of DASA
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
APNIC Update, APEC TEL 54
APNIC Update, APEC TEL 54APNIC Update, APEC TEL 54
APNIC Update, APEC TEL 54
 
Opening plenary session - Day one Networkshop46
Opening plenary session - Day one Networkshop46Opening plenary session - Day one Networkshop46
Opening plenary session - Day one Networkshop46
 
Oxford cluster overview 160414
Oxford cluster overview 160414Oxford cluster overview 160414
Oxford cluster overview 160414
 
Enhancing security incident response capabilities in the AP
Enhancing security incident response capabilities in the AP Enhancing security incident response capabilities in the AP
Enhancing security incident response capabilities in the AP
 
Isoc bishkek 2015 11-25
Isoc bishkek 2015 11-25Isoc bishkek 2015 11-25
Isoc bishkek 2015 11-25
 
Enterprise Europe Network - Chris Lyons
Enterprise Europe Network - Chris Lyons Enterprise Europe Network - Chris Lyons
Enterprise Europe Network - Chris Lyons
 
ISCR2013
ISCR2013ISCR2013
ISCR2013
 
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LV
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LVDSS ITSEC 2013 Conference 07.11.2013 - CERT.LV
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LV
 
Accelerator Autonomous Last Mile Resupply - DASA overview
Accelerator Autonomous Last Mile Resupply - DASA overviewAccelerator Autonomous Last Mile Resupply - DASA overview
Accelerator Autonomous Last Mile Resupply - DASA overview
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
 
Ict Hub For Rural Orgs
Ict Hub For Rural OrgsIct Hub For Rural Orgs
Ict Hub For Rural Orgs
 
Browne Jacobson LLP Jon Snade - London Tech Week
Browne Jacobson LLP Jon Snade - London Tech WeekBrowne Jacobson LLP Jon Snade - London Tech Week
Browne Jacobson LLP Jon Snade - London Tech Week
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 

The Impact of the General Data Protection Regulation - 10th May 2016

  • 1. The Impact of the General Data Protection Regulation 10th May, University of Nottingham
  • 2.
  • 3. Welcome • Welcome and Housekeeping – University of Nottingham • Introduction to the Partners in EMCSF: o Qonex o East Midlands Chamber (Derbyshire, Nottinghamshire, Leicestershire) o Institute of Information Security Professionals (IISP) o UK Cyber Security Forum • Programme for the evening
  • 4. East Midlands Chamber • c4000 members across Derbys, Notts & Leics –Largest business support organisation in East Midlands –2nd largest Chamber UK • A voice for business • Supporting business –Events & Networking –International Trade –Training & Recruitment –HR/Legal Advice
  • 5. East Midlands Chamber Business Security • Bringing businesses together to –help themselves –share best practice • Source of Security Advice • Seminars, Workshops and Conferences
  • 6. Institute of Information Security Professionals (IISP) • Professional body for those working in the cyber security sector • Individual and company membership • Offers career progression, access to resources, events and publications • East Midlands branch run by Nexor • Run a series of events – presentations and networking
  • 7. Developing strategies to prevent cyber-attacks causing harm CyberSecurityStrategy Security Assessment Security Management Systems Countermeasures Technology Solutions Security Testing Cyber Essentials Security Training Risk & Threat Assessment Standards Compliance Partners } Our Services:
  • 8. UK Cyber Security Forum • Represents small companies who are actively working in cyber security across the UK • Completely free to join • Has over 500 members across the country • East Midlands cluster hosted by Nexor
  • 9. Programme for tonight • Welcome and Introductions • Be careful what you wish for: the great Data Protection law reform Lilian Edwards, University of Strathclyde • Break • The new Regulation: are you ready? Helena Wootton, Browne Jacobson
  • 10. The Impact of the General Data Protection Regulation 10th May, University of Nottingham
  • 11. Cyber Security conference 11th July 2016 National Space Centre, Leicester • Exhibition & Conference, featuring: –Keynote presentations from industry leaders –Product Showcases –Training sessions
  • 12. Next East Midlands Cyber Security Forum event • We are looking to hold our next EMCSF event in October • Aim is for event every 3 months approximately • Alternating between Nottingham and Leicester
  • 13. The Impact of the General Data Protection Regulation 10th May, University of Nottingham