9:00- 9:30 - Registration, tea and coffee

9:30-10:10 - A pragmatic approach to GDPR with Jim Sneddon (AssureData)

10:10-10:35 –Achieving GDPR Compliance with ZoneFox

10:35-11:00 – Break

11:00-11:25 – Okta: Preparing for GDPR Compliance with IAM

11:30-11:55 – ESET: Protect your business in the event of a data breach

12:00-12:25 – Meeting GDPR Compliance with LepideAuditor

12:30-12:55 – Balabit: Meeting GDPR Compliance with PSM

13:00 – Lunch and networking

14:00 – The chance to look around the museum


Achieving GDPR Compliance with ZoneFox

To meet and remain compliant with GDPR, your security strategy and controls must encompass people, processes and technology – with a key part of that technology including a robust Insider Threat detection capability. Effective Insider Threat management will go a long way toward regulatory compliance with GDPR.

Okta: Preparing for GDPR Compliance with IAM

Hear about Okta's security practices, how their approach to identity management aligns with the GDPR's underlying policy goals, and how you can prepare for the new policy using a leading IAM solution.

ESET: Protect your Business in the event of a data breach

By securely encrypting the data you hold, your business can protect itself in the event of a breach as it is less likely to be regarded as a compliance failure by regulatory authorities. ESET Endpoint Encryption uses a combination of public and private keys to make encryption simple and powerful for all organizations.

Meeting GDPR compliance with LepideAuditor

LepideAuditor provides a single centralized console that enables you to audit, monitor and alert to changes and events surrounding your data. LepideAuditor also provides a number of specific reports that can help you meet aspects of GDPR compliance, particularly Article 5 and Article 32.

Balabit: Meeting GDPR Compliance with PSM

The GDPR requires the restriction of access to personal data so controllers must take technical measures to control access to sensitive data, including some level of user monitoring and authorization. Discover how Privileged Session Management with Balabit can help.