The UKs #1 Data Protection Consultancy

Data Protection & Information Security Experts

Data Protection Made Easy.

GDPR Support Cyber Security Support

Accelerate Your Data Protection Compliance

Save Time, Save Money and Relax: You’re In Safe Hands

Discover the comprehensive range of data protection services at Data Protection People. Tailored to meet the unique needs of your organisation, our expert team has successfully handled every challenge imaginable. Whether you’re navigating compliance complexities or enhancing data security, trust DPP to be your partner in safeguarding information.

GDPR Training

Data Protection People have a wide range of training services catering for every need. Whether its general training for operational or admin staff or specific training for specialist roles, we have something for you. watch the short video below to meet the team and find out more about our training services.

Contact Us

Information Management Software

DataWise is the original privacy tech platform designed to simplify GDPR compliance management. Since its inception in 2011, DataWise has continuously evolved, solidifying its reputation as the pioneering "privacy tech" solution.

Contact Us

Data Protection Consultancy

Unlock Compliance Excellence with Our GDPR Consultancy Services. Navigating the intricate realm of data protection laws and standards demands expert guidance.

Contact Us

Outsourced DPO

A data protection officer doesn't have to be a full time employee and in many respects it's better to have a company like DPP take on the role. Watch the video below to find out more about our outsourced DPO and privacy officer services or reach out and get in touch with us.

Contact Us
View All

Need Help With Cyber Security Compliance?

We Have You Covered!

At Data Protection People, our cyber security services are designed to fortify your digital defences. With a proven track record spanning diverse sectors in the UK, our seasoned team brings a wealth of experience in handling a wide array of cybersecurity challenges. Reach out to us and explore how DPP can enhance your organisation’s cyber resilience.

ISO 27001

Our tailored program, guided by industry-certified experts, supports your ISO 27001 compliance journey. Whether you need advice on certification scope, assistance with remediation work, or comprehensive ISO 27001 consultancy, we’re here to guide you every step of the way.

Contact Us

PCI DSS

A PCI assessment is an audit for validating compliance with the Payment Card Industry Data Security Standard (PCI DSS), a set of security standards for merchants who accept, process, store or transmit credit card information.

Contact Us

Cyber Security Consultancy

Our Cyber Security Consultancy services offer a robust framework to safeguard your digital assets. With a team of Certified Information Systems Security Professionals (CISSPs) and a unique blend of industry-specific expertise, we stand as a leading authority in cyber security consultancy.

Contact Us

Cyber Security Support

Secure your organisation with Data Protection People's Cyber Security Support. Our expert team ensures cybersecurity excellence, offering tailored support for ISO27001, PCI DSS, Cyber Maturity, Cyber Essentials Plus, and more.

Contact Us
View All

Supporting DPOs

Flexible Support When You Need It

At Data Protection People, we recognise the dynamic challenges and unique responsibilities of the Data Protection Officer (DPO) role. Beyond offering standard support, we provide a comprehensive suite of services crafted to empower DPOs at every step.

Collaborative Community: Navigating the intricate landscape of data protection can be isolating. That’s why we’ve fostered a collaborative community of privacy professionals. As a DPO with us, you’re never alone. Our network serves as a forum for insightful discussions, sharing solutions, and building a sense of camaraderie.

Expert Guidance and Advice: The journey of a DPO is often filled with complex decisions. Our seasoned team of experts is your reliable resource, offering timely advice and strategic guidance. We’re not just a service provider; we’re your dedicated partners in overcoming challenges and making informed decisions.

Advanced Training for Continuous Growth: Stay ahead in your role with our advanced training programs. Tailored for DPOs, our courses delve into intricate aspects of data protection, providing you with a competitive edge. It’s not just about meeting the present challenges but ensuring your continuous growth and excellence in your role.

Audits, Assessments, and Document Reviews: Our services extend beyond conventional boundaries. From comprehensive audits and assessments to meticulous document reviews, we ensure that your data protection strategies are not only compliant but also optimised for efficiency.

Simplifying Complexity for Future Ease: Beyond addressing current challenges, our mission is to simplify the complexities inherent in data protection. By partnering with Data Protection People, you’re not just solving problems – you’re ensuring a smoother, more efficient role in the future. We streamline processes, making your responsibilities more manageable and your decisions more impactful.

Join our extensive list of clients who have their data privacy under control

Diverse Sector Experience

Access to a Team of Industry Experts

At Data Protection People, our expertise spans across diverse sectors, ensuring that businesses of all sizes and orientations receive tailored Data Protection and Cyber Security solutions. From the dynamic commercial sector and agile SMEs to the impactful third sector and expansive multi-nationals, we extend our services to fortify the digital defences of every business entity.

Commercial Sector

Elevate your data protection and cybersecurity standards in the bustling landscape of the Commercial Sector. We offer tailored solutions designed to safeguard your sensitive information, ensuring compliance and resilience against evolving threats. Partner with us to fortify your digital assets and foster a secure environment for sustained growth.

SMEs

Small and Medium Enterprises (SMEs) form the backbone of innovation. Our data protection and cybersecurity services are crafted to match the agility of SMEs. Navigate the digital landscape securely, optimize your operations, and scale confidently with our tailored solutions that prioritize your unique business needs.

Third Sector

Third Sector

For organisations in the Third Sector driven by purpose, our data protection and cybersecurity expertise align with your mission. Safeguard sensitive data, build stakeholder trust, and amplify your positive impact. Let our solutions be the backbone of your technology infrastructure, ensuring that your focus remains on making a difference.

Multi Nationals

For the global footprint of Multi Nationals, our data protection and cybersecurity services provide a comprehensive shield. Navigate the complexities of international regulations with confidence. From compliance strategies to threat intelligence, we've got your data security needs covered, empowering your multinational endeavors with resilience.

Public Sector

In the Public Sector, trust and accountability are paramount. Our data protection and cybersecurity consultancy ensures that your operations align seamlessly with regulatory requirements. From confidential citizen data to streamlined governance, our solutions empower public entities to serve with integrity and technological excellence.

Why Use Our Outsourced DPO Services?

Save Time, Money and Guarantee Compliance

Navigating the intricate landscape of data protection demands more than just a DPO — it requires a dedicated team committed to excellence. Our Outsourced DPO Services extend beyond the traditional role, offering a comprehensive approach to legal compliance and pragmatic solutions.

Why Choose Outsourcing?

An outsourced DPO brings a wealth of experience, not just in the law but also in crafting workable solutions. Their impartiality is fortified by a team of privacy practitioners, ensuring that your organization benefits from a spectrum of expertise. Should the need arise, seamless coverage during absences is guaranteed, eliminating the vulnerability associated with a single in-house DPO.

Staying Headache-Free

Concerned about the disruption if your DPO moves on? With an outsourced model, transitions are smooth, and you won’t experience the sudden headache of a critical role vacancy. The continuity provided by a team ensures that your data protection responsibilities are seamlessly handled.

Compliance Tailored to You

Our Outsourced DPO Services align seamlessly with your legal obligations, whether you’re mandated to appoint a DPO or choose to do so voluntarily. We understand that compliance is not just about ticking boxes but about ensuring a robust, practical approach to data protection. Choose Data Protection People for a worry-free, compliance-driven outsourced DPO solution — because your data protection journey should be as smooth as it is secure.

“I cant recommend Data Protection People enough, they have helped me in so many different areas, no matter how complex the challenge or how large the obstacle, DPP always has the answer.

I can call the team at any time and have built an amazing relationship with them, in times of frustration they are here to calm me down and create a plan, they are a pleasure to work with.”

Mark Leete
Eastlight Community Homes

Data Protection People Blogs & Podcasts

Data Privacy Learning & Guidance

Data Protection People have the UK’s #1 Data Protection Podcast with over 150 episodes available across all audio streaming platforms, we also post regular content designed to simplify complex areas of data protection and cyber security, check out some of the podcasts and articles below and make data protection easy today.

7 AI Threats You Should Know About

Artificial intelligence can be a tremendous force for good – advancing society, health and knowledge. It’s up to AI developers, the world’s governments and AI users to make sure the risks of AI don’t outweigh its advantages.

While the EU AI Act will be a significant step towards AI regulation, last year over 1,400 tech leaders called for a more drastic measure – a halt to advanced AI development until robust safety protocols are put in place to protect society. These are the 7 main AI threats individuals and organisations should know about; note that many overlap.

1. AI Threats to Personal Privacy 

AI systems often store and process large amounts of personal data. The privacy regulations in the EU AI Act – and the best practice to follow – mirror the GDPR guidelines. You can minimise the risk of data breaches and unauthorised access with data protection procedures, audits, training and cyber security.

2. AI perpetuating bias and discrimination

AI systems must be trained up – and learn more as you use them. There’s a risk that biases might exist in this training data or algorithms, so AI could perpetuate or amplify societal biases and inequalities.

3. Lack of transparency in AI systems

Usually, the decisions and processes that lead AI to an outcome are hidden away. We must have insight into this from AI developers to know that the AI is unbiased, accurate and not causing unintended consequences.

4. Increasingly Sophisticated AI Cyber Crime

Cyber criminals are notoriously resourceful – and AI is one powerful resource. As AI becomes more sophisticated, so will the ever-evolving methods of cyber attack. Not to mention new vulnerabilities in the AI and your systems to defend your organisation against.

5. AI Replacing Human Intelligence (or Acquiring It)

Relying too much on AI risks losing skills like creativity and critical thinking. Robots taking over jobs is a very real prospect too. Proactively balancing AI with human intelligence would help to counter these AI threats.

‘Runaway self-improvement’ is the idea that AI could self-evolve beyond human control and become self-aware. Think 2001: A Space Odyssey, The Terminator or The Matrix. While the jury’s out on this risk, safety and ethical regulations for advanced AI remain critical. 

6. Threats to Human Life

Instead of Hal, Arnie or sentient tentacles, consider life-supporting AI or self-driving cars. This AI is classed as high-risk by the EU AI Act and it’s where the most regulation applies as mandatory. Weaponised AI is another threat to human life but one, hopefully, world governments can control – in a good way. 

7. Misinformation and manipulation

From deep fake to social media recommendations, AI can manipulate public opinion and actions. Misinformation (unintentional inaccuracies) and disinformation (deliberate untruths) in particular, were highlighted in the infamous AI open letter as the most pressing dangers of AI.

Speak to the Experts at Data Protection People

At Data Protection People, we use our expertise in data protection and cyber security to support businesses and organisations of every size. As AI evolves, we can help you comply with AI regulations and protect your organisation against AI threats. Contact the team today.

 

SAR Training Course

Data Protection People’s SAR Training Course

Master the Art of Subject Access Requests (SARs) and Ensure Data Protection Compliance

Are you looking to:

  • Gain a comprehensive understanding of SARs and their legal framework?
  • Confidently handle SARs, from receiving requests to crafting responses?
  • Navigate exemptions effectively and comply with data subject rights?
  • Develop the skills to identify personal data, manage response timescales, and retrieve relevant data efficiently?

Our SAR training course equips you with the knowledge and expertise to excel in SAR management.

Key Learning Objectives:

  • Understand the concept and legal framework of SARs.
  • Master the step-by-step process of handling SARs, including timeframes.
  • Gain in-depth knowledge of data subject rights and exemptions.
  • Develop the ability to identify and categorise personal data accurately.
  • Manage response timescales effectively and prioritise requests.
  • Employ efficient data retrieval techniques to find relevant information.
  • Apply redaction techniques while ensuring compliance with data protection regulations.
  • Draft professional and informative SAR responses addressing all aspects of the request.
  • Ensure compliance with legal obligations and maintain a high standard of data privacy.

Who Should Attend:

Course Details:

  • Duration: 7 Hours
  • Delivery Method: Microsoft Teams / In-House*
  • Price: £395 per person

Contact Us:

To learn more, reserve your spot, or explore other courses, contact us:

Don’t miss this opportunity to empower yourself and your organisation with the expertise to handle SARs effectively and confidently.

SARs Training Information / View Our Data Protection Training Series 

GDPR Audits: 5 Crucial Steps

GDPR audits are the only way to check that your organisation is fully GDPR compliant. 

You should complete a GDPR audit annually. A lot can change in a year. You might start using new data capture processes, or new management software, or there could be changes in regulations.

In our GDPR audits checklist, we explained the most important areas to assess in a GDPR audit. In this article, we look at the process of conducting a GDPR audit. 

We have extensive experience conducting GDPR audits for a diverse variety of organisations across private businesses, the public sector and charities. While we shape each audit around the organisation’s unique needs, every GDPR audit will feature these five crucial steps.

1. Planning and Preparation

We’ll work with you to understand your organisation and define the scope and objectives of your GDPR audit. This will help us identify the systems, processes and data flows we need to map, assess and test. We’ll also collect documentation – like your data processing policies and procedures. 

2. Data Mapping 

Personal data is information that can identify individuals and ranges from names and addresses to video footage. GDPR applies to all personal data your organisation holds, whether it’s about your employees, customers or third parties.

Data mapping captures how all personal data flows through your organisation’s ecosystem. Documenting this is a core part of GDPR compliance. Our auditors will build a comprehensive map of the personal data your organisation collects, stores and processes:

  • Identifying and documenting the types of personal data you collect
  • Defining the purpose for handling each data category
  • Assessing the lawful basis for processing 

3. Assessment and Testing

We start by evaluating your data protection policies, procedures and practices against GDPR requirements. Then assess the effectiveness of measures you have in place to protect personal data. Our technical testing will include audits of network security, encryption protocols and data retention policies. 

If you hold someone’s data and they ask you to provide or delete it, this is known as a Subject Access Request or SAR and you need robust processes to respond. Of course, you also need these systems in case of a data breach or security incident. We will assess and test your SAR and incident procedures.

4. Reporting and Recommendations

We will prepare a formal audit report, highlighting any areas of non-compliance or gaps in your data protection – as well as the practices you’re doing well. Based on our findings at the assessment and testing stage, we’ll develop a recommended action plan of corrective steps and enhancements.

5. Optimisation and Continuous Improvement

You might see this step referred to as ‘remediation’, but at Data Protection People, we go beyond fixing problems to enhance your data protection. We work with you to implement your action plan, updating your policies, practices and controls to ensure complete GDPR compliance. 

It’s crucial to continually monitor your data protection practices between your annual GDPR audits. This is the responsibility of your Data Protection Officer (DPO). To take the pressure off, we can provide an expert outsourced DPO for your organisation.

GDPR compliance extends beyond the wording of policies and digital controls. Everyone at your organisation is responsible for following data protection regulations. So ensure you’re regularly educating your teams, and talk to us about our GDPR training.

Book Your GDPR Audit Today

At Data Protection People our mission is to eliminate the confusion around data protection. Whether you’re a micro-business or a multi-national, we have the expertise to help you achieve GDPR compliance – and understand it.

Contact the team to learn more about GDPR audits 

Data Protection Book Recommendations

Top 5 Data Protection Book Recommendations

Happy World Book Day! Whether you’re an experienced data protection professional or just starting your journey in this crucial field, expanding your knowledge is always valuable. Today, we’re diving into the world of data protection through the power of books, offering a selection to cater to different interests and learning styles.

 Comprehensive Learner:

Strategist:

 Security-Conscious:

 Quick Learner:

UK-Based Learner:

Growing Your Knowledge Further

While books offer a wealth of knowledge, there’s always an alternative for those who prefer a different learning format. If reading isn’t your preferred method, consider tuning in to the Data Protection Made Easy Podcast!

The Data Protection Made Easy Podcast features insightful discussions with leading experts, tackling various data protection and cybersecurity topics in an engaging and accessible manner. This is a fantastic way to stay informed and gain valuable insights from industry professionals, all while on the go!

So, whether you delve into the world of data protection through books or explore the insightful discussions on the Data Protection Made Easy Podcast, remember, continuous learning is key to staying informed and empowered in this ever-evolving field.

Join us on the Data Protection Made Easy podcast for the following events:

  • Challenges for big & small businesses (March 8th): Learn More
  • Latest data protection news (March 15th & 29th) : Learn More
  • The impact of the DPDI Bill (March 22nd) : Learn More
  • Collaboration between privacy & security teams (April 5th & May 3rd) : Learn More
  • Raising awareness against cyber attacks (April 19th) : Learn More

Happy World Book Day and happy learning!

Data Protection: Big vs. Small Businesses

Data Protection: Big vs. Small Businesses

The Same Goal, Different Playing Fields

This week’s episode of the Data Protection Made Easy podcast tackles the critical topic of data protection challenges faced by organisations of all sizes. While the core principles of data security and user privacy remain constant, the episode highlights how these challenges manifest differently for large corporations and small businesses.

Beyond the Basics: A Shift in Focus

The hosts acknowledge spending time on the “why” of data protection for small businesses. They recognised that many listeners likely already understand its importance. However, the real conversation shifted to a valuable exploration of the gap between the perception vs. reality of data protection burdens for smaller organisations.

Unique Challenges for Small Businesses

  • Resource Constraints: Small businesses, often with limited staff and budgets, struggle to navigate the complexities of data processing, especially when international transfers are involved.
  • Compliance Hurdles: Regulatory compliance places the same weight on small businesses as large corporations. This creates a significant challenge considering small businesses might have fewer teams, tighter budgets, and potentially less in-house data protection expertise.
  • Culture Gap: Data protection, compared to well-established health and safety regulations, lacks a similar ingrained culture. This can lead to less awareness and potentially higher risks of non-compliance for small businesses.

A Double-Edged Sword: The GDPR and Small Businesses

The episode’s discussion acknowledged the General Data Protection Regulation (GDPR) as a potential “wall breaker” for smaller businesses. The GDPR, despite its complexities, can offer a valuable framework for them to implement data protection measures and achieve compliance.

Looking to the Future: The Data Protection and Digital Information Bill

The co-hosts hinted at future episodes delving deeper into the Data Protection and Digital Information Bill. Listeners can expect to learn more about the impact of this new legislation on both small and large organisations.

A Celebration and a Look Ahead

The episode concluded with a tease for part two, promising further exploration of the bill and its relation to businesses of varying sizes. Listeners were encouraged to stay tuned for the next instalment. On a lighter note, the podcast recording also served as a springboard to celebrate a minor milestone – Jasmine’s approaching one-year anniversary as podcast host!

Click here and tune-in to the Data Protection Made Easy podcast on Spotify

GDPR Radio – Episode 160

This Week on GDPR Radio: Regulatory Updates, AI Concerns, and WhatsApp Dilemmas

Welcome back to GDPR Radio, hosted by Data Protection People. This week’s episode was led by your expert hosts Jasmine Harrison, Joe Kirk, and Philip Brining.

This week’s episode was packed with data protection news and discussions! Here’s a quick recap of the key topics covered:

ICO in Action: The Information Commissioner’s Office (ICO) recently issued fines related to data breaches. This included a penalty for the Ministry of Defence and enforcement action against the Home Office and Serco.

AI and Privacy: The team discussed the growing concerns around artificial intelligence (AI) and its impact on workplace privacy, particularly regarding employee monitoring and data collection.

Privacy Policies: They unpacked the common misconception of websites stating that “by continuing, you accept our privacy policy.” They explained why you should refrain from this approach and emphasized the importance of clear, transparent, and user-friendly privacy policies.

Insider Trading: The episode delved into a discussion about insider trading and the potential legal consequences of using information obtained through private conversations (e.g., a spouse’s work meeting).

WhatsApp and Subject Access Requests: The episode concluded with a cautionary tale surrounding WhatsApp usage in organizations and whether it is caught under the scope of an employee subject access request. Alhe hosts acknowledged the context-dependent nature of this topic and encouraged further discussion.

This episode provided valuable insights for anyone navigating the ever-evolving landscape of data protection. Don’t forget to tune in next week as the podcast tackles the challenges faced by organizations of all sizes!

Have questions or want to share your thoughts? We encourage you to reach out to Data Protection People using the button below.

Stay informed and stay compliant with Data Protection Made Easy.

Episode 159: Mastering Third-Party Relationships (Part Two)

Data Protection Made Easy: Mastering Third-Party Relationships (Part Two) – A Deeper Dive

Join hosts Jasmine Harrison, Joe Kirk, and Phil Brining for Episode 159: Mastering Third-Party Relationships (Part Two). This is the second part of a series on the crucial topic of mastering third-party relationships with organisations in data protection. Let’s delve deeper into each point discussed:

1. Revisiting the Basics:

  • The episode starts by revisiting the fundamental concept of third-party relationships in data protection. This includes understanding the difference between:
    • Joint control: When two or more organisations share control over the purpose and means of processing personal data.
    • Independent control: Where one organisation has complete control over the data processing activities.

2. Navigating International Data Transfers:

  • The discussion dives into the complexities associated with transferring personal data across borders. Key points include:
    • Understanding “adequacy decisions”: These are rulings by the European Commission determining whether a non-EU country offers a level of data protection comparable to the General Data Protection Regulation (GDPR). If a country lacks adequacy, additional safeguards might be needed for data transfers.
    • Addressing organisational challenges: The episode acknowledges practical difficulties organisations face when transferring data internationally, including complying with different national regulations and implementing appropriate security measures.

3. Learning from a Real-World Case:

  • The hosts share a practical case study related to third-party relationships, offering valuable insights into:
    • Potential challenges organisations might encounter in real-world scenarios.
    • The importance of considering various factors when navigating third-party relationships in practice.

4. Expanding the Scope of Third-Party Relationships:

  • The episode goes beyond the typical “controller-processor” relationship, emphasising the importance of considering other crucial third parties, such as:
    • The Information Commissioner’s Office (ICO): The UK’s data protection regulator, responsible for enforcing data protection laws and potentially interacting with organisations.
    • Data Protection Consultants: Experts who provide guidance and support to organisations on navigating complex data protection issues.
    • Other Organisations: Potential collaborations with partners, vendors, or even competitors that might involve data sharing, requiring careful consideration of data protection aspects.

5. Beyond Formal Data Sharing:

  • The conversation extends the understanding of third-party relationships beyond formal data sharing agreements. It acknowledges that such relationships can also involve:
    • Responding to ad-hoc data requests from regulators like the ICO, where personal details might be inadvertently disclosed.
    • Reporting a data breach, where personal details might be included even with efforts to minimise it.

Overall, this episode emphasises the importance of adopting a comprehensive view of third-party relationships when managing data protection effectively. It goes beyond the traditional controller-processor relationship, highlighting the broader ecosystem involved in handling personal data and the need for careful consideration of all aspects in this complex landscape.

Listen to Episode 159: Mastering Third-Party Relationships (Part Two) here:

Motivating Your Workforce For Data Protection

Unleashing Hidden Potential: Motivating Your Workforce For Data Protection

The latest episode touched upon crucial aspects of employee motivation, leaving you inspired to ignite your team’s passion. But how do you translate those insights into long-lasting changes? This article goes beyond the episode, offering practical strategies to unlock hidden potential and cultivate a motivated workforce.

Understanding Motivation:

Remember, one size doesn’t fit all. What motivates one employee might demotivate another. Take time to understand individual needs and preferences. Consider:

  • Intrinsic vs. extrinsic factors: Some thrive on autonomy and growth, while others respond well to recognition and rewards.
  • Personal values: Align tasks with employee values to create a sense of purpose and meaning.
  • Learning styles: Offer diverse learning and development opportunities to cater to individual preferences.

Building Strong Foundations:

Psychological safety is paramount. Foster an environment where employees feel comfortable sharing ideas, voicing concerns, and taking risks without fear of judgment.

Clear communication is key. Regularly discuss goals, expectations, and feedback in a transparent and open manner.

Empowerment fuels engagement. Delegate tasks, provide autonomy, and trust your employees to make decisions.

Recognition and appreciation go a long way. Acknowledge achievements, big and small, to show employees their contributions matter.

Learning and development opportunities unlock potential. Invest in training, mentorship, and upskilling programs to help employees grow and evolve.

Beyond the Basics:

Remember, motivation is an ongoing journey, not a one-time destination. Here are some bonus tips:

  • Celebrate small wins: Recognise and reward progress, not just final outcomes.
  • Promote work-life balance: Offer flexible work arrangements and encourage employees to recharge outside of work.
  • Create a positive work environment: Foster a sense of community, belonging, and fun.
  • Encourage collaboration: Teamwork fosters camaraderie, shared ownership, and problem-solving skills.
  • Connect with the bigger picture: Help employees understand their role in the company’s mission and purpose.

Remember: Every action counts. Start small, experiment, and measure the impact of your efforts. With dedication and commitment, you can create a work environment where motivation thrives, propelling your workforce and your business to new heights.

If you would like to tune in to previous episodes of our podcast, click here: https://open.spotify.com/show/0EUicNr0gkLJvQFqzvc5oy?si=cbe2725758f141f0

Tune in to this week’s episode here: https://open.spotify.com/episode/1u0q7c3hNgjjUP3XnHP1vx?si=tUv9FH-GTpGc1fC01QUiEA

Our Events & Webinars

Industry Leading Discussions

We host events on a weekly basis for the community of data protection practitioners and have built up a network of over 1200 subscribers, who tune in each week to listen to discussions about the hot topics from the fast-paced and evolving world of data protection and cyber security. Check out our upcoming events and become part of our growing community.

View All
03 May 24 12:30 - 1:30 pm

Collaboration Between Security & Privacy Teams

19 April 24 12:30 - 1:30 pm

Shield Your Organisation from Cyber Attacks

Get Support With Data Protection And Cyber Security

Our mission is to make data protection and cyber security easy: easy to understand and easy to do. We do that through the mantra of benchmark, improve, maintain.

Hidden
Hidden