SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
The Impact of the General Data
Protection Regulation
10th May, University of Nottingham
Welcome
• Welcome and Housekeeping – University of Nottingham
• Introduction to the Partners in EMCSF:
o Qonex
o East Midlands Chamber (Derbyshire, Nottinghamshire, Leicestershire)
o Institute of Information Security Professionals (IISP)
o UK Cyber Security Forum
• Programme for the evening
East Midlands Chamber
• c4000 members across Derbys, Notts & Leics
–Largest business support organisation in East Midlands
–2nd largest Chamber UK
• A voice for business
• Supporting business
–Events & Networking
–International Trade
–Training & Recruitment
–HR/Legal Advice
East Midlands Chamber
Business Security
• Bringing businesses together to
–help themselves
–share best practice
• Source of Security Advice
• Seminars, Workshops and Conferences
Institute of Information Security
Professionals (IISP)
• Professional body for those working in the
cyber security sector
• Individual and company membership
• Offers career progression, access to
resources, events and publications
• East Midlands branch run by Nexor
• Run a series of events – presentations and
networking
Developing strategies to prevent
cyber-attacks causing harm
CyberSecurityStrategy Security Assessment
Security Management
Systems
Countermeasures
Technology Solutions
Security Testing
Cyber Essentials
Security Training
Risk & Threat Assessment
Standards Compliance
Partners
}
Our Services:
UK Cyber Security Forum
• Represents small companies who are
actively working in cyber security across
the UK
• Completely free to join
• Has over 500 members across the
country
• East Midlands cluster hosted by Nexor
Programme for tonight
• Welcome and Introductions
• Be careful what you wish for: the great Data Protection law reform
Lilian Edwards, University of Strathclyde
• Break
• The new Regulation: are you ready?
Helena Wootton, Browne Jacobson
The Impact of the General Data
Protection Regulation
10th May, University of Nottingham
Cyber Security conference
11th July 2016
National Space Centre, Leicester
• Exhibition & Conference, featuring:
–Keynote presentations from industry leaders
–Product Showcases
–Training sessions
Next East Midlands Cyber
Security Forum event
• We are looking to hold our next
EMCSF event in October
• Aim is for event every 3
months approximately
• Alternating between
Nottingham and Leicester
The Impact of the General Data
Protection Regulation
10th May, University of Nottingham

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Giving culture a helping hand: National Library of Scotland metadata and digi...
Giving culture a helping hand: National Library of Scotland metadata and digi...Giving culture a helping hand: National Library of Scotland metadata and digi...
Giving culture a helping hand: National Library of Scotland metadata and digi...
 
Expand your professional network with iabc 2016 v2
Expand your professional network with iabc 2016 v2Expand your professional network with iabc 2016 v2
Expand your professional network with iabc 2016 v2
 
PrivacyOS
PrivacyOSPrivacyOS
PrivacyOS
 
About European Open Science Cloud
About European Open Science CloudAbout European Open Science Cloud
About European Open Science Cloud
 
Workshop 11 - Europe - Niall Kearney
Workshop 11 - Europe - Niall Kearney Workshop 11 - Europe - Niall Kearney
Workshop 11 - Europe - Niall Kearney
 
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...
TCI 2013 Fast-tracking Cluster Internationalisation Using Innovation Express ...
 
An overview of the Joint Security and Resilience Centre
An overview of the Joint Security and Resilience CentreAn overview of the Joint Security and Resilience Centre
An overview of the Joint Security and Resilience Centre
 
GDPR and EA - Commissioning a web site
GDPR and EA - Commissioning a web siteGDPR and EA - Commissioning a web site
GDPR and EA - Commissioning a web site
 
Rosalie hoskins digital financial sustainability
Rosalie hoskins digital financial sustainabilityRosalie hoskins digital financial sustainability
Rosalie hoskins digital financial sustainability
 
KTN funding opportunities & networking events
KTN funding opportunities & networking eventsKTN funding opportunities & networking events
KTN funding opportunities & networking events
 
Copy of a presentation given by Professor Sir Nigel Shadbolt
Copy of a presentation given by Professor Sir Nigel Shadbolt Copy of a presentation given by Professor Sir Nigel Shadbolt
Copy of a presentation given by Professor Sir Nigel Shadbolt
 
Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...Introduction to the Centre for Defence Enterprise and introducing the Defence...
Introduction to the Centre for Defence Enterprise and introducing the Defence...
 
Accelerator autonomous last mile resupply - how to work with the Accelerator
Accelerator autonomous last mile resupply - how to work with the AcceleratorAccelerator autonomous last mile resupply - how to work with the Accelerator
Accelerator autonomous last mile resupply - how to work with the Accelerator
 
Introduction to Networkshop - Networkshop44 2016
Introduction to Networkshop - Networkshop44 2016Introduction to Networkshop - Networkshop44 2016
Introduction to Networkshop - Networkshop44 2016
 
Cetis and OER, SLA SIG
Cetis and OER, SLA SIGCetis and OER, SLA SIG
Cetis and OER, SLA SIG
 
Vis Moot in University of Georgia (Tbilisi)
Vis Moot in University of Georgia (Tbilisi)Vis Moot in University of Georgia (Tbilisi)
Vis Moot in University of Georgia (Tbilisi)
 
Stakeholder forum 2015 - Engaging across the uk - Robert Haymon-Collins
Stakeholder forum 2015 - Engaging across the uk - Robert Haymon-CollinsStakeholder forum 2015 - Engaging across the uk - Robert Haymon-Collins
Stakeholder forum 2015 - Engaging across the uk - Robert Haymon-Collins
 
Immerse UK Presentation - Immersive Experiences briefing London
Immerse UK Presentation - Immersive Experiences briefing LondonImmerse UK Presentation - Immersive Experiences briefing London
Immerse UK Presentation - Immersive Experiences briefing London
 
18 November 2014: Knowledge Transfer Network
18 November 2014: Knowledge Transfer Network18 November 2014: Knowledge Transfer Network
18 November 2014: Knowledge Transfer Network
 
Stakeholder forum 2015 - 2015 and beyond - Martyn Harrow
Stakeholder forum 2015 - 2015 and beyond - Martyn HarrowStakeholder forum 2015 - 2015 and beyond - Martyn Harrow
Stakeholder forum 2015 - 2015 and beyond - Martyn Harrow
 

Andere mochten auch

Andere mochten auch (20)

Ransomware - Mark Chimely
Ransomware - Mark ChimelyRansomware - Mark Chimely
Ransomware - Mark Chimely
 
How to avoid becoming the next victim of ransomware
How to avoid becoming the next victim of ransomwareHow to avoid becoming the next victim of ransomware
How to avoid becoming the next victim of ransomware
 
Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...Be careful what you wish for: the great Data Protection law reform - Lilian E...
Be careful what you wish for: the great Data Protection law reform - Lilian E...
 
Qonex - Securing the IoT
Qonex - Securing the IoTQonex - Securing the IoT
Qonex - Securing the IoT
 
General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...General Data Protection Regulation: what do you need to do to get prepared? -...
General Data Protection Regulation: what do you need to do to get prepared? -...
 
IISP East Midlands Sept 2014 - Jim Shields presentation
IISP East Midlands Sept 2014 - Jim Shields presentationIISP East Midlands Sept 2014 - Jim Shields presentation
IISP East Midlands Sept 2014 - Jim Shields presentation
 
Managing and insuring cyber risk - a risk perspective
Managing and insuring cyber risk - a risk perspectiveManaging and insuring cyber risk - a risk perspective
Managing and insuring cyber risk - a risk perspective
 
Econocom - identifying funding for success
Econocom - identifying funding for successEconocom - identifying funding for success
Econocom - identifying funding for success
 
Governance - the Role of the Board
Governance - the Role of the BoardGovernance - the Role of the Board
Governance - the Role of the Board
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
Mike Gillespie - The Internet of Everything
Mike Gillespie - The Internet of Everything Mike Gillespie - The Internet of Everything
Mike Gillespie - The Internet of Everything
 
Redscan - Insider threat case study
Redscan - Insider threat case studyRedscan - Insider threat case study
Redscan - Insider threat case study
 
Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways Webroot - self-defending IoT devices & gateways
Webroot - self-defending IoT devices & gateways
 
Achieving Cyber Essentials
Achieving Cyber Essentials Achieving Cyber Essentials
Achieving Cyber Essentials
 
Managing and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policiesManaging and insuring cyber risk - coverage of insurance policies
Managing and insuring cyber risk - coverage of insurance policies
 
Trustworthy Software
Trustworthy SoftwareTrustworthy Software
Trustworthy Software
 
Mitigation starts now
Mitigation starts nowMitigation starts now
Mitigation starts now
 
Information Security in AWS - Dave Walker
Information Security in AWS - Dave WalkerInformation Security in AWS - Dave Walker
Information Security in AWS - Dave Walker
 
Data Breaches and the EU GDPR
Data Breaches and the EU GDPRData Breaches and the EU GDPR
Data Breaches and the EU GDPR
 
EU General Data Protection Regulation & Transborder Information Flow
EU General Data Protection Regulation & Transborder Information FlowEU General Data Protection Regulation & Transborder Information Flow
EU General Data Protection Regulation & Transborder Information Flow
 

Ähnlich wie The Impact of the General Data Protection Regulation - 10th May 2016

Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
Awais Shibli
 

Ähnlich wie The Impact of the General Data Protection Regulation - 10th May 2016 (20)

NWCSC March 2022 event.pptx
NWCSC March 2022 event.pptxNWCSC March 2022 event.pptx
NWCSC March 2022 event.pptx
 
How to cyber protect your business for free
How to cyber protect your business for freeHow to cyber protect your business for free
How to cyber protect your business for free
 
NWCSC Manchester region event
NWCSC Manchester region event NWCSC Manchester region event
NWCSC Manchester region event
 
SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016SMi Group's 6th annual European Smart Grid Cyber Security 2016
SMi Group's 6th annual European Smart Grid Cyber Security 2016
 
The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...
The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...
The NZITF, a 'trust group’ of volunteers in a country with no National C, by ...
 
Continuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security FrameworkContinuous Multilayer Protection: Operationalizing a Security Framework
Continuous Multilayer Protection: Operationalizing a Security Framework
 
DASA: FASS 2: Overview of DASA
DASA: FASS 2: Overview of DASADASA: FASS 2: Overview of DASA
DASA: FASS 2: Overview of DASA
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
APNIC Update, APEC TEL 54
APNIC Update, APEC TEL 54APNIC Update, APEC TEL 54
APNIC Update, APEC TEL 54
 
Opening plenary session - Day one Networkshop46
Opening plenary session - Day one Networkshop46Opening plenary session - Day one Networkshop46
Opening plenary session - Day one Networkshop46
 
Oxford cluster overview 160414
Oxford cluster overview 160414Oxford cluster overview 160414
Oxford cluster overview 160414
 
Enhancing security incident response capabilities in the AP
Enhancing security incident response capabilities in the AP Enhancing security incident response capabilities in the AP
Enhancing security incident response capabilities in the AP
 
Isoc bishkek 2015 11-25
Isoc bishkek 2015 11-25Isoc bishkek 2015 11-25
Isoc bishkek 2015 11-25
 
Enterprise Europe Network - Chris Lyons
Enterprise Europe Network - Chris Lyons Enterprise Europe Network - Chris Lyons
Enterprise Europe Network - Chris Lyons
 
ISCR2013
ISCR2013ISCR2013
ISCR2013
 
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LV
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LVDSS ITSEC 2013 Conference 07.11.2013 - CERT.LV
DSS ITSEC 2013 Conference 07.11.2013 - CERT.LV
 
Accelerator Autonomous Last Mile Resupply - DASA overview
Accelerator Autonomous Last Mile Resupply - DASA overviewAccelerator Autonomous Last Mile Resupply - DASA overview
Accelerator Autonomous Last Mile Resupply - DASA overview
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
 
Ict Hub For Rural Orgs
Ict Hub For Rural OrgsIct Hub For Rural Orgs
Ict Hub For Rural Orgs
 
Browne Jacobson LLP Jon Snade - London Tech Week
Browne Jacobson LLP Jon Snade - London Tech WeekBrowne Jacobson LLP Jon Snade - London Tech Week
Browne Jacobson LLP Jon Snade - London Tech Week
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

The Impact of the General Data Protection Regulation - 10th May 2016

  • 1. The Impact of the General Data Protection Regulation 10th May, University of Nottingham
  • 2.
  • 3. Welcome • Welcome and Housekeeping – University of Nottingham • Introduction to the Partners in EMCSF: o Qonex o East Midlands Chamber (Derbyshire, Nottinghamshire, Leicestershire) o Institute of Information Security Professionals (IISP) o UK Cyber Security Forum • Programme for the evening
  • 4. East Midlands Chamber • c4000 members across Derbys, Notts & Leics –Largest business support organisation in East Midlands –2nd largest Chamber UK • A voice for business • Supporting business –Events & Networking –International Trade –Training & Recruitment –HR/Legal Advice
  • 5. East Midlands Chamber Business Security • Bringing businesses together to –help themselves –share best practice • Source of Security Advice • Seminars, Workshops and Conferences
  • 6. Institute of Information Security Professionals (IISP) • Professional body for those working in the cyber security sector • Individual and company membership • Offers career progression, access to resources, events and publications • East Midlands branch run by Nexor • Run a series of events – presentations and networking
  • 7. Developing strategies to prevent cyber-attacks causing harm CyberSecurityStrategy Security Assessment Security Management Systems Countermeasures Technology Solutions Security Testing Cyber Essentials Security Training Risk & Threat Assessment Standards Compliance Partners } Our Services:
  • 8. UK Cyber Security Forum • Represents small companies who are actively working in cyber security across the UK • Completely free to join • Has over 500 members across the country • East Midlands cluster hosted by Nexor
  • 9. Programme for tonight • Welcome and Introductions • Be careful what you wish for: the great Data Protection law reform Lilian Edwards, University of Strathclyde • Break • The new Regulation: are you ready? Helena Wootton, Browne Jacobson
  • 10. The Impact of the General Data Protection Regulation 10th May, University of Nottingham
  • 11. Cyber Security conference 11th July 2016 National Space Centre, Leicester • Exhibition & Conference, featuring: –Keynote presentations from industry leaders –Product Showcases –Training sessions
  • 12. Next East Midlands Cyber Security Forum event • We are looking to hold our next EMCSF event in October • Aim is for event every 3 months approximately • Alternating between Nottingham and Leicester
  • 13. The Impact of the General Data Protection Regulation 10th May, University of Nottingham