GDPR is coming: how to own your data before they own you
Core GDPR event coming soon…
With General Data Protection Regulation (GDPR) becoming law in May 2018, there has never been a more precarious time for organisations to have a lack of control over the data they store. Historically, knowing exactly what data an organisation held, who was accessing it, and from where, has been the purview of only the largest companies. Smaller and mid-size enterprises who did not have the luxury of experienced security professionals and dedicated security tools were left wondering.
However, with GDPR holding all companies financially liable for data breaches (with fines of up to €20 million), company size is no longer an excuse.
Core is holding a GDPR workshop to help businesses understand the impact of GDPR, and the steps they must take towards compliance. Using elements of Microsoft’s Secure Productive Enterprise product suite, and Core’s own security expertise, we can help you take control of your data and ensure that your company does not end up a cautionary tale. Core also offers a GDPR compliancy assessment for businesses of any size interested in taking the necessary steps towards to GDPR compliance.
During the course of our half-day workshop, we will discuss the Core Managed Security life cycle and show what a typical managed security engagement with Core would look like, at a high level. The workshop will address the following aspects:
Identity – Security is not a ‘one size fits all’ proposition. In order to maximise the return on investment in security, the solution must determine the security needs of the business and balance those with maintaining a productive workforce. Core’s experienced security professionals can help with defining and writing the policies required to be the solid foundation of any security program.
Protect – How Core uses Microsoft technology to provide up-front protection in the form of encryption and multi-factor authentication.
Detect – How Core utilises the Microsoft combined ecosystem to correlate across multiple sources and determine when the data is under attack.
Respond – How Core’s experienced security professionals conduct incident response for threats to the system.
Recovery – How Core uses Microsoft technology to ensure that, in a worst case scenario, your systems and data are back up and running in the shortest time possible.
Don’t miss this opportunity to join this exciting workshop; register today to secure your place.
Please complete this form to register for this event and we will be in touch.