General Data Protection Regulation (GDPR) Readiness: Preparing for 2018 and Beyond

Instructor: Robert Davis
Product ID: 705656
  • Duration: 60 Min
In this GDPR readiness webinar learn GDPR obligations and improve your risk management strategies, how to handle data, controls, policies and technology must have to comply with GDPR requirements. Meta content – Learn General Data Protection Regulation (GDPR), whom and how it affects and what strategies to follow to minimize your risk.

recorded version

$249.00
1x Person - Unlimited viewing for 6 Months
(For multiple locations contact Customer Care)
Recorded Link and Ref. material will be available in My CO Section
Last Recorded Date: May-2018

Training CD / USB Drive

$299.00
One CD/USB is for usage in one location only.
(For multiple locations contact Customer Care)
CD/USB and Ref. material will be shipped within 15 business days

Customer Care

Fax: +1-650-362-2367

Email: customercare@complianceonline.com

Read Frequently Asked Questions

Why Should You Attend:

The General Data Protection Regulation (GDPR), taking effect in May of 2018, will reset best practices for data privacy and protection globally. Preparing for GDPR is no small task. Given the monumental work associated with GDPR, in addition to the substantial penalties for non-compliance, has propelled data protection as a business risk directly into the boardroom. Failure to comply with the European Union GDPR can expose your firm to a penalty of up to 4% of global revenue. The clock is ticking!

Join us for this webinar to accelerate your GDPR readiness, improve your risk management strategies and help you fulfill GDPR obligations. We will cover what GDPR is, whom it affects, and what principal obligations it places on businesses. How to assess your organization’s readiness and determine the most suitable compliance strategies to minimize risk exposure. It will have various recommendations and introduction of solutions that businesses may consider in preparation for GDPR’s enforcement date on May 25, 2018.

At the end of this session, the speaker will handle your specific questions and address any challenges you have/had in meeting the GDPR requirements.

Areas Covered in the Webinar:

  • Overview of GDPR:
    • What are the GDPR requirements?
    • What companies are affected, what are the risks, what are the deadlines?
  • What do you need to do today to ensure compliance with GDPR?
  • How to get started – getting a handle on data (which data, where is it, how far back do you need to go?)
  • What do you need to do to identify risk in your processes?
  • What are the minimal controls, policies, and technology you must have in place come May 2018?

Who Will Benefit:

  • Audit Committee Members
  • Risk Management Executives
  • Chief Audit Executives
  • External Audit Partners
  • Chief Executive Officers
  • Chief Financial Officers
  • Chief Information Officers
  • Compliance Executives
  • Chief Information Security Officers
Instructor Profile:
Robert E. Davis

Robert E. Davis
Professor, Temple and West Chester University

Dr. Robert E. Davis obtained a Bachelor of Business Administration in Accounting and Business Law, a Master of Business Administration in Management Information Systems, and a Doctor of Business Administration in Information Systems Management from Temple, West Chester, and Walden University; respectively. Moreover, during his twenty years of involvement in education, Dr. Davis acquired Postgraduate and Professional Technical licenses in Computer Science and Computer Systems Technology.

Dr. Davis also obtained the Certified Information Systems Auditor (CISA) certificate — after passing the 1988 Information Systems Audit and Control Association’s rigorous three hundred and fifty multiple-choice questions examination; and was conferred the Certified Internal Controls Auditor (CICA) certificate by the Institute for Internal Controls.

Since starting his career as an information system auditor, Robert has provided data security consulting and IS auditing services to corporations as well as other organizations; in staff through management positions. Before engaging in the practice of IS auditing and information security consulting; Robert (as a corporate employee) provided inventory as well as general accounting services to Philip Morris, USA, and general accounting services to Philadelphia National Bank (Wells Fargo). Furthermore, he has prior experience as a freelance writer of IT audit and information security training material.

Dr. Davis received recognition as an accomplished, energetic auditor, author, and speaker with a sound mix of experience and skills in monitoring and evaluating controls. Based on his accomplishments, Temple University's Fox School of Business and Management Alumni Newsletter, as well as The Institute for Internal Controls e-newsletter featured Dr. Davis. Furthermore, he is an Advisory Board Member of The Institute for Internal Controls, the first and inaugural Temple University CISA in Residence and a founding Temple University Master of Science in IT Auditing and Cyber-Security Advisory Councilmen. Last, he accepted invitations to join Delta Mu Delta International Honor Society, the Golden Key International Honour Society, the Thomson Reuters' Expert Witness List, the IT Governance LTD expert panel, as well as the International Association of IT Governance Standards honorary membership group.

Topic Background:

Cyber attackers have ranged from hobbyist to spies typically motivated by personal, financial, or political factors. Consequently, IT related identity theft had cost consumers over USD 5,000,000,000.00 yearly. The invasion of privacy is only symptomatic of a critical question confronting individuals living in the information age: How can corporate information security protect citizenry rights and freedoms while simultaneously controlling criminal inclinations?

After years of serving as an IT auditor and consultant, I have extrapolated that many enterprises needed effective leadership in generating consumer confidence regarding information systems management. Organizational leaders can improve the trust factor for stakeholders in technology containing personally identifiable information through effective information security governance. Personal privacy and identity are among the most valuable intangible assets individuals ever own. Nonetheless, technological manipulation continually enables intentional or unintentional privacy invasions.

Follow us :
Critical Vendor Risk Management
Regulatory and Policy Change Management Process

Refund Policy

Registrants may cancel up to two working days prior to the course start date and will receive a letter of credit to be used towards a future course up to one year from date of issuance. ComplianceOnline would process/provide refund if the Live Webinar has been cancelled. The attendee could choose between the recorded version of the webinar or refund for any cancelled webinar. Refunds will not be given to participants who do not show up for the webinar. On-Demand Recordings can be requested in exchange.

Webinar may be cancelled due to lack of enrolment or unavoidable factors. Registrants will be notified 24hours in advance if a cancellation occurs. Substitutions can happen any time.

If you have any concern about the content of the webinar and not satisfied please contact us at below email or by call mentioning your feedback for resolution of the matter.

We respect feedback/opinions of our customers which enables us to improve our products and services. To contact us please email customercare@complianceonline.com call +1-888-717-2436 (Toll Free).

Product Reviews

This product hasn't received any reviews yet. Be the first to review this product! Write review

Best Sellers
You Recently Viewed
    Loading