Data protection & IT security supports innovation! Operationalization / Part 2
The cloud is fast. But only secure if you get it “up and running” during operation.
This one-day seminar is a continuation of the previous one-day seminar, and the focus is on implementation and operationalization within the company based on the findings of the central question: when is the cloud compliant with data protection regulations and which cloud model can be selected for sensitive data? The basis is the continuation of the everyday example from part 1.
- We take a business process and identify risks for personal data – step by step.
- We use the DPIA (Data Protection Impact Assessment) as a tool:
Which data? How critical? How likely? How often? → from this we determine the residual risk.- We derive the practical usage requirements for the use of a cloud solution:
Which measures must be binding before using the cloud (preventive, practical)?- At the end, you create a management recommendation: clear, able to make decisions – including approval steps for employees.
What is your benefit from the seminar:
- You get a basis for making informed decisions instead of a gut feeling (“are we allowed to / are we not allowed to?”).
- You measurably reduce sanction, liability and downtime risks.
- You accelerate cloud projects because processes and rules can now be clearly implemented.
- You can prove your decision-making basis to the supervisory authorities upon request: We have checked. We decided. We have secured.
Write to us “Operationalization” – then I will send you the agenda, location and dates.
