Information Security Webinar

Information Security Webinar 2017-08-25T11:16:52+00:00

All organisations process information. The law of information security includes rules, codes, and standards about how you should protect information as well as the information systems that you use to process it. The legal risks can be considerable if you don’t follow a practical approach. Our solutions can help you to minimize these risks and to understand information security law.

We offer a short and useful information security webinar that will prepare you to comply with the various information security laws. We will not give you a law lecture – we give you practical guidance and insight on what to do.

Outcomes

  • Know your responsibilities that are relevant to the various information security laws (such as the GDPR in the EU, DPA in the UK, or POPIA in South Africa)
  • Be aware of the consequences of not complying properly
  • Recognize the biggest risks to your organisation
  • Take various steps to comply with the information security laws to avoid legal risks

Who should attend?

  • Directors
  • Auditors
  • Risk managers
  • IT managers
  • IT operators
  • IT security officers
  • Information (protection) officers
  • IT governance officers
  • Compliance officers
  • Consultants
  • Legal advisors

When is the next Information Security Webinar?

Join our next live Information Security webinar

  • We have not yet set dates for our next public webinar. If you’d like to attend one on this topic, send us an email.

The prices listed above exclude vat. We can invoice you the equivalent in GBP, EUR or AUD. We will email you an invoice and details of how to register. We will refund you, if you do not think you received value. If you’d like to attend a webinar on this topic but this date and time does not suit you, send us an email asking us to set another date. All you need is a good Internet connection.

What do we cover?

  • Which information has to be secure?
  • What must you comply with? Which information security laws are relevant?
  • What is appropriate and reasonable information security?
  • The responsible party, the operator and the relationship between them
  • How to deal with incidents and notify people
  • How to reduce fines by implementing good policies
  • The top legal risks and their consequences
  • Action items
  • The consequences of not complying with the regulations