GDPR HEALTHCHECK

WITH THREAT PROTECT

ARE YOU GDPR COMPLIANT?

  • 0day
  • 00hours
  • 00min
  • 00sec
Launch Date
GDPR for the boardroom: by the ICO

LEAVE IT TO THE EXPERTS

Be 100% certain that your security is in line with the GDPR by May with our comprehensive Healthcheck.

COMPLIANCE FOR A BRIGHT FUTURE

GAIN PEACE OF MIND KNOWING YOU’LL AVOID COSTLY BREACHES AND HEFTY FINES.

SIMPLIFY
YOUR
COMPLIANCE

Forget about the complex requirements of pseudonymisation and encryption tied to the GDPR, by leaving all auditing and compliance tasks to our team of experts.

Whether you’ve already worked to ensure compliance or have no idea of where your company stands, Threat Protect’s GDPR health check can quickly and painlessly evaluate your security, and point you towards the right products and services.

COMPLETE
PEACE
OF MIND

The EU General Data Protection Regulation (GDPR)

Deadline for compliance: 25 May 2018

THE GDPR HEALTHCHECK PROCESS

The GDPR Healthcheck is undertaken in two phases.

Phase 1 - Data gathering

Threat Protect have teamed-up with the world leading Thales e-Security. Our Professional Services consultant will come on site to work with you to look at the data our organisation holds relevant to the GDPR. Analysis of data sources will be performed as well as how data is processed by the organisation and its compliance with the provisions of the GDPR. We will also look at any processes that are in place necessary to comply with reporting aspects of the GDPR, including reporting information to data subjects and supervisory authorities.

Our consultants are able to work with a variety of  stakeholders in your organisation, including legal, IT, information security, risk and compliance in order to ensure that all aspects of GDPR are covered and that different areas of the organisation understand the role they play in compliance with the Regulation.

We undertake the data gathering in a variety of ways, which may include workshops, seminars and questionnaires.

Phase 2 - Analysis & Reporting

The consultant will analyse the data collected during Phase 1 and produce a report and set of recommendations. Recommendations may include both specific technical changes focused on encryption and pseudonymisation along with business process areas identified where internal policies and processes could be improved. A formal
presentation of the findings and recommendations will be
provided to all key stakeholders.

ACHIEVE CYBER RESILIENCE

PROTECT AND SURVIVE THE GROWING THREAT LANDSCAPE

WANT TO RECEIVE NEWS ON THE LASTEST THREATS AND TRENDS

Sign up to receive the latest developments and news in the industry.

For information about how we handle your data, please read our privacy notice

TOP