SlideShare una empresa de Scribd logo
1 de 13
Descargar para leer sin conexión
The Impact of the General Data
Protection Regulation
10th May, University of Nottingham
Welcome
• Welcome and Housekeeping – University of Nottingham
• Introduction to the Partners in EMCSF:
o Qonex
o East Midlands Chamber (Derbyshire, Nottinghamshire, Leicestershire)
o Institute of Information Security Professionals (IISP)
o UK Cyber Security Forum
• Programme for the evening
East Midlands Chamber
• c4000 members across Derbys, Notts & Leics
–Largest business support organisation in East Midlands
–2nd largest Chamber UK
• A voice for business
• Supporting business
–Events & Networking
–International Trade
–Training & Recruitment
–HR/Legal Advice
East Midlands Chamber
Business Security
• Bringing businesses together to
–help themselves
–share best practice
• Source of Security Advice
• Seminars, Workshops and Conferences
Institute of Information Security
Professionals (IISP)
• Professional body for those working in the
cyber security sector
• Individual and company membership
• Offers career progression, access to
resources, events and publications
• East Midlands branch run by Nexor
• Run a series of events – presentations and
networking
Developing strategies to prevent
cyber-attacks causing harm
CyberSecurityStrategy Security Assessment
Security Management
Systems
Countermeasures
Technology Solutions
Security Testing
Cyber Essentials
Security Training
Risk & Threat Assessment
Standards Compliance
Partners
}
Our Services:
UK Cyber Security Forum
• Represents small companies who are
actively working in cyber security across
the UK
• Completely free to join
• Has over 500 members across the
country
• East Midlands cluster hosted by Nexor
Programme for tonight
• Welcome and Introductions
• Be careful what you wish for: the great Data Protection law reform
Lilian Edwards, University of Strathclyde
• Break
• The new Regulation: are you ready?
Helena Wootton, Browne Jacobson
The Impact of the General Data
Protection Regulation
10th May, University of Nottingham
Cyber Security conference
11th July 2016
National Space Centre, Leicester
• Exhibition & Conference, featuring:
–Keynote presentations from industry leaders
–Product Showcases
–Training sessions
Next East Midlands Cyber
Security Forum event
• We are looking to hold our next
EMCSF event in October
• Aim is for event every 3
months approximately
• Alternating between
Nottingham and Leicester
The Impact of the General Data
Protection Regulation
10th May, University of Nottingham

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Giving culture a helping hand: National Library of Scotland metadata and digi...
Giving culture a helping hand: National Library of Scotland metadata and digi...Giving culture a helping hand: National Library of Scotland metadata and digi...
Giving culture a helping hand: National Library of Scotland metadata and digi...
 
Expand your professional network with iabc 2016 v2
Expand your professional network with iabc 2016 v2Expand your professional network with iabc 2016 v2
Expand your professional network with iabc 2016 v2
 
PrivacyOS
PrivacyOSPrivacyOS
PrivacyOS
 
About European Open Science Cloud
About European Open Science CloudAbout European Open Science Cloud
About European Open Science Cloud
 
Workshop 11 - Europe - Niall Kearney
Workshop 11 - Europe - Niall Kearney Workshop 11 - Europe - Niall Kearney
Workshop 11 - Europe - Niall Kearney
 
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...
 
An overview of the Joint Security and Resilience Centre
An overview of the Joint Security and Resilience CentreAn overview of the Joint Security and Resilience Centre
An overview of the Joint Security and Resilience Centre
 
GDPR and EA - Commissioning a web site
GDPR and EA - Commissioning a web siteGDPR and EA - Commissioning a web site
GDPR and EA - Commissioning a web site
 
Rosalie hoskins digital financial sustainability
Rosalie hoskins digital financial sustainabilityRosalie hoskins digital financial sustainability
Rosalie hoskins digital financial sustainability
 
KTN funding opportunities & networking events
KTN funding opportunities & networking eventsKTN funding opportunities & networking events
KTN funding opportunities & networking events
 
Copy of a presentation given by Professor Sir Nigel Shadbolt
Copy of a presentation given by Professor Sir Nigel Shadbolt Copy of a presentation given by Professor Sir Nigel Shadbolt
Copy of a presentation given by Professor Sir Nigel Shadbolt
 
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...
 
Accelerator autonomous last mile resupply - how to work with the Accelerator
Accelerator autonomous last mile resupply - how to work with the AcceleratorAccelerator autonomous last mile resupply - how to work with the Accelerator
Accelerator autonomous last mile resupply - how to work with the Accelerator
 
Introduction to Networkshop - Networkshop44 2016
Introduction to Networkshop - Networkshop44 2016Introduction to Networkshop - Networkshop44 2016
Introduction to Networkshop - Networkshop44 2016
 
Cetis and OER, SLA SIG
Cetis and OER, SLA SIGCetis and OER, SLA SIG
Cetis and OER, SLA SIG
 
Vis Moot in University of Georgia (Tbilisi)
Vis Moot in University of Georgia (Tbilisi)Vis Moot in University of Georgia (Tbilisi)
Vis Moot in University of Georgia (Tbilisi)
 
Stakeholder forum 2015 - Engaging across the uk - Robert Haymon-Collins
Stakeholder forum 2015 - Engaging across the uk - Robert Haymon-CollinsStakeholder forum 2015 - Engaging across the uk - Robert Haymon-Collins
Stakeholder forum 2015 - Engaging across the uk - Robert Haymon-Collins
 
Immerse UK Presentation - Immersive Experiences briefing London
Immerse UK Presentation - Immersive Experiences briefing LondonImmerse UK Presentation - Immersive Experiences briefing London
Immerse UK Presentation - Immersive Experiences briefing London
 
18 November 2014: Knowledge Transfer Network
18 November 2014: Knowledge Transfer Network18 November 2014: Knowledge Transfer Network
18 November 2014: Knowledge Transfer Network
 
Stakeholder forum 2015 - 2015 and beyond - Martyn Harrow
Stakeholder forum 2015 - 2015 and beyond - Martyn HarrowStakeholder forum 2015 - 2015 and beyond - Martyn Harrow
Stakeholder forum 2015 - 2015 and beyond - Martyn Harrow
 

Destacado

Destacado (20)

Ransomware - Mark Chimely
Ransomware - Mark ChimelyRansomware - Mark Chimely
Ransomware - Mark Chimely
 
How to avoid becoming the next victim of ransomware
How to avoid becoming the next victim of ransomwareHow to avoid becoming the next victim of ransomware
How to avoid becoming the next victim of ransomware
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...
 
Qonex - Securing the IoT
Qonex - Securing the IoTQonex - Securing the IoT
Qonex - Securing the IoT
 
General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...
 
IISP East Midlands Sept 2014 - Jim Shields presentation
IISP East Midlands Sept 2014 - Jim Shields presentationIISP East Midlands Sept 2014 - Jim Shields presentation
IISP East Midlands Sept 2014 - Jim Shields presentation
 
Managing and insuring cyber risk - a risk perspective
Managing and insuring cyber risk - a risk perspectiveManaging and insuring cyber risk - a risk perspective
Managing and insuring cyber risk - a risk perspective
 
Econocom - identifying funding for success
Econocom - identifying funding for successEconocom - identifying funding for success
Econocom - identifying funding for success
 
Governance - the Role of the Board
Governance - the Role of the BoardGovernance - the Role of the Board
Governance - the Role of the Board
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
Mike Gillespie - The Internet of Everything
Mike Gillespie - The Internet of Everything Mike Gillespie - The Internet of Everything
Mike Gillespie - The Internet of Everything
 
Redscan - Insider threat case study
Redscan - Insider threat case studyRedscan - Insider threat case study
Redscan - Insider threat case study
 
Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways
 
Achieving Cyber Essentials
Achieving Cyber Essentials Achieving Cyber Essentials
Achieving Cyber Essentials
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policies
 
Trustworthy Software
Trustworthy SoftwareTrustworthy Software
Trustworthy Software
 
Mitigation starts now
Mitigation starts nowMitigation starts now
Mitigation starts now
 
Information Security in AWS - Dave Walker
Information Security in AWS - Dave WalkerInformation Security in AWS - Dave Walker
Information Security in AWS - Dave Walker
 
Data Breaches and the EU GDPR
Data Breaches and the EU GDPRData Breaches and the EU GDPR
Data Breaches and the EU GDPR
 
EU General Data Protection Regulation & Transborder Information Flow
EU General Data Protection Regulation & Transborder Information FlowEU General Data Protection Regulation & Transborder Information Flow
EU General Data Protection Regulation & Transborder Information Flow
 

Similar a The Impact of the General Data Protection Regulation - 10th May 2016

Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
Awais Shibli
 

Similar a The Impact of the General Data Protection Regulation - 10th May 2016 (20)

NWCSC March 2022 event.pptx
NWCSC March 2022 event.pptxNWCSC March 2022 event.pptx
NWCSC March 2022 event.pptx
 
How to cyber protect your business for free
How to cyber protect your business for freeHow to cyber protect your business for free
How to cyber protect your business for free
 
NWCSC Manchester region event
NWCSC Manchester region event NWCSC Manchester region event
NWCSC Manchester region event
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016
 
The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...
The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...
The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...
 
Continuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security FrameworkContinuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security Framework
 
DASA: FASS 2: Overview of DASA
DASA: FASS 2: Overview of DASADASA: FASS 2: Overview of DASA
DASA: FASS 2: Overview of DASA
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
APNIC Update, APEC TEL 54
APNIC Update, APEC TEL 54APNIC Update, APEC TEL 54
APNIC Update, APEC TEL 54
 
Opening plenary session - Day one Networkshop46
Opening plenary session - Day one Networkshop46Opening plenary session - Day one Networkshop46
Opening plenary session - Day one Networkshop46
 
Oxford cluster overview 160414
Oxford cluster overview 160414Oxford cluster overview 160414
Oxford cluster overview 160414
 
Enhancing security incident response capabilities in the AP
Enhancing security incident response capabilities in the AP Enhancing security incident response capabilities in the AP
Enhancing security incident response capabilities in the AP
 
Isoc bishkek 2015 11-25
Isoc bishkek 2015 11-25Isoc bishkek 2015 11-25
Isoc bishkek 2015 11-25
 
Enterprise Europe Network - Chris Lyons
Enterprise Europe Network - Chris Lyons Enterprise Europe Network - Chris Lyons
Enterprise Europe Network - Chris Lyons
 
ISCR2013
ISCR2013ISCR2013
ISCR2013
 
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LV
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LVDSS ITSEC 2013 Conference 07.11.2013 - CERT.LV
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LV
 
Accelerator Autonomous Last Mile Resupply - DASA overview
Accelerator Autonomous Last Mile Resupply - DASA overviewAccelerator Autonomous Last Mile Resupply - DASA overview
Accelerator Autonomous Last Mile Resupply - DASA overview
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
 
Ict Hub For Rural Orgs
Ict Hub For Rural OrgsIct Hub For Rural Orgs
Ict Hub For Rural Orgs
 
Browne Jacobson LLP Jon Snade - London Tech Week
Browne Jacobson LLP Jon Snade - London Tech WeekBrowne Jacobson LLP Jon Snade - London Tech Week
Browne Jacobson LLP Jon Snade - London Tech Week
 

Último

Último (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

The Impact of the General Data Protection Regulation - 10th May 2016

  • 1. The Impact of the General Data Protection Regulation 10th May, University of Nottingham
  • 2.
  • 3. Welcome • Welcome and Housekeeping – University of Nottingham • Introduction to the Partners in EMCSF: o Qonex o East Midlands Chamber (Derbyshire, Nottinghamshire, Leicestershire) o Institute of Information Security Professionals (IISP) o UK Cyber Security Forum • Programme for the evening
  • 4. East Midlands Chamber • c4000 members across Derbys, Notts & Leics –Largest business support organisation in East Midlands –2nd largest Chamber UK • A voice for business • Supporting business –Events & Networking –International Trade –Training & Recruitment –HR/Legal Advice
  • 5. East Midlands Chamber Business Security • Bringing businesses together to –help themselves –share best practice • Source of Security Advice • Seminars, Workshops and Conferences
  • 6. Institute of Information Security Professionals (IISP) • Professional body for those working in the cyber security sector • Individual and company membership • Offers career progression, access to resources, events and publications • East Midlands branch run by Nexor • Run a series of events – presentations and networking
  • 7. Developing strategies to prevent cyber-attacks causing harm CyberSecurityStrategy Security Assessment Security Management Systems Countermeasures Technology Solutions Security Testing Cyber Essentials Security Training Risk & Threat Assessment Standards Compliance Partners } Our Services:
  • 8. UK Cyber Security Forum • Represents small companies who are actively working in cyber security across the UK • Completely free to join • Has over 500 members across the country • East Midlands cluster hosted by Nexor
  • 9. Programme for tonight • Welcome and Introductions • Be careful what you wish for: the great Data Protection law reform Lilian Edwards, University of Strathclyde • Break • The new Regulation: are you ready? Helena Wootton, Browne Jacobson
  • 10. The Impact of the General Data Protection Regulation 10th May, University of Nottingham
  • 11. Cyber Security conference 11th July 2016 National Space Centre, Leicester • Exhibition & Conference, featuring: –Keynote presentations from industry leaders –Product Showcases –Training sessions
  • 12. Next East Midlands Cyber Security Forum event • We are looking to hold our next EMCSF event in October • Aim is for event every 3 months approximately • Alternating between Nottingham and Leicester
  • 13. The Impact of the General Data Protection Regulation 10th May, University of Nottingham