What is GDPR?

The European Union’s (EU) General Data Protection Regulation (GDPR) creates additional security and privacy obligations for organizations to comply with. All organizations, including those outside of the EU that hold data on European citizens, need to review their obligations under GDPR.

 

Addressing GDPR Requirements

Failing to comply with GDPR can be costly with fines up to €20 million or 4% of annual worldwide turnover.

Addressing the requirements may differ by organization. However, the general requirements include:

  • Data protection by design, requiring organizations to include data protection considerations in their initial process and/or product rather than as an afterthought.
  • Greater emphasis on accountability and transparency, requiring organizations to document their cybersecurity processes from prevention to incident response.
  • Mandatory reporting of data breaches, requiring organizations to report a breach to the relevant supervisory authority within 72 hours, and to also inform affected customers.

Technology alone won't keep you GDPR compliant.

Many organizations are looking for technology to provide them with the quick and easy answer to GDPR compliance. Organizations who leverage layers of security solutions often struggle to understand the gaps that allow advanced threats like ransomware to leak through. Pure technology solutions also fail to detect unknown threats that don’t have existing signatures or rules.

A data protection plan that extends beyond technology is critical to securing a realistic and actionable strategy for GDPR compliance.

Download our GDPR Workbook to see an outline of the framework requirements, so you to map your current approach and gain an understanding of your areas of risk.

A comprehensive approach to GDPR compliance.

visibility

Detect

Cyber threats are unique. Your cybersecurity defences should be too.

eSentire Managed Detection and Response (MDR) keeps organizations safe from constantly evolving cyber-attacks that technology alone cannot prevent. Our 24x7 Security Operations Center (SOC) is staffed by elite security analysts who hunt, investigate and respond in real-time to known and unknown threats before they become business disrupting events.

agile

Respond

An alert without action won’t help you.

In our world, seconds matter. Our approach to micro-incident response ensures attacks are addressed before they become business disruptions. Our hunt teams are vigilant, constantly investigating new threats in real-time. When they find one, our SOC investigates and responds on your behalf as an extension of your team.

Ready to start the conversation?

Let's Talk