YoVDO

GDPR's Information Security Requirements - What Exactly is 'Appropriate'?

Offered By: RSA Conference via YouTube

Tags

RSA Conference Courses GDPR Courses Compliance Courses Data Protection Courses Risk Assessment Courses

Course Description

Overview

Explore the complexities of GDPR's information security requirements in this 40-minute conference talk from RSA Conference. Delve into the concept of 'appropriate' technical and organizational measures for ensuring personal data protection. Learn how to interpret Article 32's guidance on factors like cost, risk, state of the art, scope, and purpose to determine what's suitable for your organization. Gain insights into regulatory perspectives and develop a framework for assessing and implementing appropriate security measures. Understand the impact of variables such as implementation costs, risk levels, and fundamental rights on security decisions. Discover how to create a good security baseline, calculate risks, and adapt to changing appropriateness standards. Equip yourself with the knowledge to navigate GDPR compliance effectively and confidently justify your organization's security approach to regulators.

Syllabus

Intro
What is appropriate
Law
Formula
Cost of implementation
Risk
Fundamental Rights
Impact Scales
Risk Calculation
Good Security Baseline
Security Outcomes
Who determines whats appropriate
What is inappropriate
Inconsistencies
Big or Small
Summary
Appropriateness Changes
Questions


Taught by

RSA Conference

Related Courses

Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Compliance in Office 365: eDiscovery
Microsoft via edX
Legal Compliance For Incorporating Startup
Indian Institute of Technology Kanpur via Swayam
The Business of Cybersecurity Capstone
University System of Georgia via Coursera
Creating a Portfolio
Indian School of Business via Coursera