How organisations are failing to process personal data lawfully under the GDPR

How organisations are failing to process personal data lawfully under the GDPR

Welcome to this week’s Security Spotlight, where we shine a light on: 

 

New Q&A | How Organisations Are Failing to Process Personal Data Lawfully Under the GDPR 

A core GDPR principle is that personal data must be processed lawfully. 

However, organisations still struggle to get this right. 

This Q&A with data privacy trainer and DPO Andrew Snow covers: 

  • Business benefits of GDPR compliance  

  • Purpose limitation  

  • Retention periods  

  • Lawful bases  

  • Consent  

  • Lawful processing: not breaking other laws  

Read the full interview 

 

New Q&A | Boost Your Security Posture With Objective-Based Penetration Testing 

To maximise value from your security investments, your measures must be effective. 

How can you be confident your measures are fit for purpose – and prove it to stakeholders like customers, partners and regulators?  

Penetration testing offers a vital tool. 

This Q&A with our head of security testing, James Pickard , covers: 

  • Is your security programme effective?  

  • Objective-based penetration tests  

  • Black, grey and white box penetration tests  

  • Red team assessments  

  • Manual vs automated penetration testing  

Read the full interview 

 


New blog | The 6 CCSP Domains Explained 

The CCSP (Certified Cloud Security Professional) certification was developed to address the growing need for Cloud security professionals and the rapidly escalating use of Cloud services. 

Learn about the 6 CCSP domains, the aim of each module, and their subsections. 

Read more 

 

New blog | What Is the UK Benchmark for GDPR Compliance? 

Our sister company DQM GRC discusses: 

  • What is a GDPR gap analysis? 

  • Why conduct a GDPR gap analysis? 

  • What GDPR compliance areas do organisations struggle most with? 

Read more  


Free green paper | Assured Security – Getting cyber secure with penetration testing 

Information is the lifeblood of the modern business, so organisations should strive to keep it secure. 

Penetration testing can help. 

This free green paper covers: 

  • What is penetration testing? 

  • How does penetration testing work? 

  • What types of vulnerabilities can go undetected for months? 

  • What are the different types of penetration test? 

Download now 

 

Free green paper | Penetration Testing and ISO 27001 – Securing your ISMS 

Penetration testing also fits into an ISO 27001 ISMS project. 

As part of your risk assessment, you must identify security risks within your ISMS scope. 

This free green paper explains how you can do this through penetration testing. 

Download now 

 


Free webinar | Cyber Essentials vs ISO 27001 – Decoding the key differences 

Tuesday, 12 November 2024, 3:00 – 4:00 pm (GMT) 

Choosing the right cyber security framework can be daunting. 

This webinar breaks down the key differences between Cyber Essentials and ISO 27001. 

Our experts Ashley Brett and Andrew Pattison will: 

  • Offer practical advice and insights based on their extensive experience 

  • Tackle common misconceptions 

  • Discuss the benefits and challenges of each framework 

  • Guide you through the steps to prepare for successful implementation 

Whether you’re a small business looking to strengthen your security or a larger organisation considering ISO 27001, this session will provide the clarity you need to make an informed decision. 

Register now 

We previously interviewed Ashley about the key differences between Cyber Essentials and ISO 27001. 

 

Free webinar | Using ISO/IEC 27018 as the Key to Data Privacy in the Cloud 

Wednesday, 20 November 2024, 3:00 – 4:00 pm (GMT) 

Get an overview of ISO 27018 in this free webinar, delivered by Alice Turley and Andrew Johnston

  • How does ISO 27018 align with ISO 27001? 

  • How does ISO 27018 certification enhance data privacy compliance and security? 

  • What are practical steps to integrate ISO 27001 principles with ISO 27018 and other standards? 

  • What are real-world examples of ISO 27018, and how does the Standard add value? 

Whether you’re a DPO, GDPR professional or information security manager, you’ll get a comprehensive understanding of ISO 27018 and its critical role in ensuring data privacy in the Cloud. 

Register now 

 

Speak to an information security expert 

With 20+ years’ experience in information security, we understand risk management. 

Our experts have implemented information security programmes for hundreds of organisations across a multitude of industries in both the private and public sectors. 

New to the world of information security and need advice on how to get started? 

Or updating an existing information security programme? 

Our experts are here to help. 

Get in touch 

To view or add a comment, sign in

More articles by IT Governance Ltd

Explore topics