GDPR Training
GDPR TRAINING
Basic training 4 hours
- Introduction privacy; what is it?
- Background regulation;
- Important terminology;
- Processing register /
- Privacy management;
- What is expected from your organization?
Data leaks; - What are appropriate technical and organizational measures?
After this training you have a theoretical framework with practical tools, starting with privacy in your organization.
Training Data Protection Officer 3 days
Legal framework GDPR
- Scope GDPR (material and territorial)
- Concept personal data (+ judgments court if present)
- Core roles in the GDPR (data controller, processor and subject)
- Key principles
- Target binding
- Privacy Principles (such as data minimization etc but also information on duty, rights of the data subject, documentation obligation, duty to report)
- Collaboration with third parties (processing agreement)
- Role of the DPO (tasks, responsibility and competences)
From Privacy to cybersecurity within the GDPR
- Data Protection Impact Assessment (DPIA)
- Legal and practical aspects of reporting data leaks
- Maturity level organizations
- Tooling: accountability
- Aspects of cybersecurity
- CIA classifications
- ISOs 27001, 27002
- Compliance (legislation and regulations)
- Organizational
- Access control
- Business continuity
- Physical access
- Incident management
- Measures for remote work
- Legal and practical aspects of reporting data leaks
From people to technology and control of GDPR policy
- Workplace security
- HR Security
- Human behavior (awareness)
- Asset management
- Communication security
- Operational security
- Cryptography
- Basic explanation computers
- OS (s)
- Applications
- Networking
- Risk assessment and taking measures
- What are risks
- Risk assessment
- Threats
- Weaknesses
- Opportunity x impact
- Measures and approach
- What are effective measures
- Cost / result considerations
- Baseline of measures
- Prepare roadmap
- Security and privacy policy
- How do I set up an information security and privacy policy?
- Determine responsible persons and senders IS and privacy policy
- Plan, do, check and act within Information Security and Privacy Management
- Explanation on the basis of templates
- Prepare roadmap
- Evaluation of measures
- Maturity level organizations
Contact us
- Your personal data will only be used for follow-up.