Cyber Risk and the General Data Protection Regulation (GDPR)
In a world of increasing regulation around Data gathering, control and processing, online security breaches have become the new frontline for crime. Demand for protection against Cyber Risk is increasing – driven by corporate dependence on digital assets, increasing sophistication of cyber criminals and changing legislation. Our workshop will explore how Cyber Risks affects business and ways that your organisations could use to mitigate these risks, whilst managing compliance with Regulatory requirements and more precisely with the forthcoming General Data Protection Regulation (GDPR).
Key Learning Points
- The state of cyber security in Cyprus.
- Being resilient first needs an understanding of the entry points. For organizations to respond to cyber-attacks they first need to know their weak points done through assessments of the current security state and road maps for the mitigation of these weak points.
- Being secure is not a once off practice. It takes time and ongoing monitoring to deter attackers and secure the organization. As vulnerabilities are exposed every day it is a game of cat and mouse between vendors and hackers.
- Information security is not just about computer security. Computer security can carry the wrong assumption that as long as the infrastructure and systems are secure the organization is also secure. Covert operations security tests enables an organization to assess their overall readiness and awareness using realistic scenario based controlled incidents.
- People are your weakest link. What is the storyline when an unsuspecting employee is targeted either by phishing email or social engineering?
- CBEST Implementation and Certification and the impact on local banks.
General Data Protection Regulation (GDPR)
- Overview of the current Data Protection Regulation.
- What changes with the new General Data Protection Regulation (GDPR).
- What are the obligations, measures, mechanisms and controls that organisations will need to take in order to comply with the new requirements.
- What actions should be taken before and after a Cyber Attack and a subsequent Data Breach.
Who should attend the course?
The course is addressed to Chief Technology Officers, Chief Operating Officers, Chief Risk Management Officers, Information Security Officers, Data Protection Officers, Legal and Compliance Officers and other IT executives.
|Time and duration
|14:00 - 17:30 (3 hours)
|6 December 2016
|Nicosia, Deloitte Offices
|• Panicos Papamichael – Partner, Head of Risk Advisory
• Yiannis Ioannides – Manager, Cyber Risk Specialist
• Christos Makedonas – Manager, Discovery & Digital Forensics
|€100 (+VAT) per person