EU General Data Protection Regulation Finally Passes

The European Data Protection Supervisor (EDPS) is an independent supervisory authority whose primary objective is to ensure that European institutions and bodies respect the right to privacy and data protection when they process personal data and develop new policies.

It has been over four years in the making but the EU Parliament and Council have finally approved the (GDPR) after the EU Council of Ministers approved the final text.

The compromise agreement reached just before Christmas has remained intact, having been agreed by both the EU Council of Ministers and Parliament. This decision means that the GDPR text will not be amended further and is now in its final state.

A two-year implementation process will begin once the Official Journal of the EU publishes the regulation - the final step to complete before the regulation becomes EU law.

The real work for European organisations will now begin. The task of picking over the legislation and interpreting what its real impact will be is now underway. The ICO will publish its guidance in due course.

Mark Thompson, privacy lead in KPMG’s cyber security practice, said: “It has been a long time coming; with more suggested amendments than any other EU regulation, we are finally there.

"The EU has finally herded the cats up the hill which sends a firm message to businesses that privacy is at the forefront of the EU’s mind, and organisations need to take action to address their privacy risks.

“Privacy will be catapulted up the list of global organisations enterprise risks, requiring them to re-evaluate take action. It’s clear that by the time the regulation comes into play in 2018, for a number of organisations, there will be a lot of work to do.”
 
DataIQ: http://bit.ly/1SyIT3p

« The CIA Invests In Firms That Mine Social Media
Analytics To Discover Who's Really Who »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Backup Technology

Backup Technology

Backup Technology is a world leader in the Online Cloud Backup, Disaster Recovery and Business Continuity market.

Second Nature Security (2NS)

Second Nature Security (2NS)

2NS provide vulnerability assessment, penetration testing, security audit, application and network security and secure software development processes.

Holm Security

Holm Security

Holm Security are taking vulnerability assessment into the next generation as a cloud service.

V-Key

V-Key

V-Key is a global leader in software based digital security, providing solutions for mobile identity, authentication, authorization, and mobile payments for major banks.

Cyber Command - Estonian Defence Forces

Cyber Command - Estonian Defence Forces

The main mission of the Cyber Command is to carry out operations in cyberspace in order to provide command support for Ministry of Defence’s area of responsibility.

Sertainty

Sertainty

Sertainty enables developers to mix intelligence into data files for active risk mitigation and data control. Discover the impact of Data: Empowered.

BlackDice Cyber

BlackDice Cyber

Threat Intelligence is only part of the solution. Our solution matches threats to vulnerabilities and automatically takes remedial action against compromised apps, devices and websites.

Encova Insurance

Encova Insurance

Encova’s cyber liability coverage protects you and your customers in case of a security breach in your company's data.

Luta Security

Luta Security

Luta Security implements a holistic approach to advance the security maturity of governments and organizations around the world.

CCX Technologies

CCX Technologies

CCX Technologies design and develop a wide range of cybersecurity and testing solutions for the aviation, and military and government markets.

Frontal

Frontal

Frontal is a specialized unit in Blockchain and Web3.0 cybersecurity. Securing Digital Assets, Cryptocurrency, DeFi, Blockchain and Web3.0 ecosystem.

CyFlare

CyFlare

CyFlare’s security platform integrates your tools with ours – delivering true positives, automated remediation, and interactive analytics built for security management teams.

Cydea

Cydea

Cydea are an optimistic cyber security consultancy of experts in security, data, technology and design that want to build a safer, more secure world where more things go right.

Silobreaker

Silobreaker

Silobreaker is a SaaS platform that enables threat intelligence teams to produce high-quality and relevant intelligence at a faster pace.

ITButler e-Services

ITButler e-Services

At IT Butler, our mission is crystal clear: we are dedicated to providing top-tier cybersecurity solutions and best-practice methodologies to secure and enhance your digital infrastructure’s resilienc

Algoritha

Algoritha

Algoritha is a pioneering entity in the realm of security and forensic services.