Resources
Podcasts, Guides, Updates & More

Join our extensive list of clients who have their data privacy under control
Data Protection People Blogs
Data Privacy Learning & Guidance
Our mission is to make data protection easy: easy to understand and easy to do. Our weekly podcasts are available in our Resource Centre along with a collection of articles, white papers, useful guidance, templates, case law, and opinions – providing you with tools you can utilise in your workplace.
What is External Attack Surface Management & Why Does Your Business Need It?
Businesses of all sizes face increasing cybersecurity threats. One of the most overlooked yet critical aspects of cybersecurity is External Attack Surface Management (EASM). But what exactly is it, and why does your organisation need to take it seriously?
Understanding External Attack Surface Management
External Attack Surface Management refers to the continuous discovery, monitoring, and management of all external-facing digital assets that a business owns. These assets can include websites, cloud services, email servers, remote work infrastructure, and any internet-exposed endpoints that cybercriminals could exploit.
In simpler terms, your external attack surface comprises everything an attacker could see and potentially target from outside your organisation’s network. If left unmanaged, these assets create vulnerabilities that hackers can leverage for data breaches, ransomware attacks, and other cyber threats.
Why is an External Attack Surface Management Important for UK Businesses?
The UK faces a rising number of cyber threats, with businesses across all sectors experiencing increased attacks. According to the UK Government’s Cyber Security Breaches Survey 2023, 32% of UK businesses reported a cyber breach or attack in the past year. The consequences of such breaches can be financially and reputationally devastating.
EASM plays a key role in proactively identifying security weaknesses before cybercriminals can exploit them. By continuously assessing your attack surface, your organisation can:
- Reduce the risk of cyber attacks by closing security gaps before they are targeted.
- Comply with UK data protection laws, such as the UK GDPR and the Data Protection Act 2018, which require organisations to take appropriate security measures to protect personal data.
- Protect sensitive data from exposure due to misconfigurations or outdated software.
- Enhance incident response by ensuring that IT and security teams are aware of all external-facing assets.
The Components of an Effective EASM Strategy
A successful External Attack Surface Management strategy involves several key steps:
- Asset Discovery
Businesses often lose track of their digital footprint, especially when new applications, cloud services, or third-party vendors are introduced. EASM helps identify all internet-facing assets, including shadow IT (unknown or unapproved assets that employees may use without IT’s knowledge).
- Continuous Monitoring
Cyber threats evolve rapidly, and what is secure today may be vulnerable tomorrow. Continuous monitoring ensures that new risks are detected as soon as they emerge, allowing security teams to act quickly.
- Vulnerability Assessment
Once assets are identified, EASM scans for vulnerabilities, misconfigurations, and weak points that attackers could exploit. This assessment helps businesses prioritise and fix the most critical security issues.
- Risk Prioritisation
Not all security risks carry the same level of urgency. EASM categorises risks based on their potential impact and likelihood of exploitation, ensuring that businesses address the most serious threats first.
- Incident Response & Remediation
In the event of a security incident, a well-managed EASM strategy provides valuable insights into how the attack happened and how to prevent future occurrences. Businesses can take corrective action to strengthen their defences.
Legal & Compliance Considerations in the UK
Under the UK General Data Protection Regulation (UK GDPR) and the Data Protection Act 2018, businesses are legally required to implement appropriate security measures to protect personal data. Failure to do so can result in severe penalties from the Information Commissioner’s Office (ICO), as well as reputational damage and loss of customer trust.
EASM aligns with UK data protection laws by helping businesses:
- Identify and mitigate security risks that could lead to data breaches.
- Ensure compliance with regulatory requirements around cybersecurity and data protection.
- Demonstrate due diligence and accountability in protecting customer and employee data.
How to Implement EASM in Your Business
- Conduct an External Attack Surface Audit
Start by assessing your current external-facing digital assets. This may involve using automated security tools or working with a cybersecurity consultancy to map out your attack surface.
- Leverage Threat Intelligence
Cybercriminals constantly evolve their tactics. Stay ahead of threats by using real-time threat intelligence feeds that help predict and prevent potential attacks.
- Automate Security Assessments
Manual monitoring is inefficient for large organisations. Implement automated security scanning tools to continuously check for vulnerabilities and misconfigurations.
- Regularly Patch & Update Systems
Outdated software and neglected security patches are prime targets for cybercriminals. Ensure that all systems, including third-party applications, are regularly updated.
- Educate Employees on Cyber Hygiene
Employees play a crucial role in securing your external attack surface. Provide ongoing cybersecurity awareness training to prevent common security mistakes.
Final Thoughts
With cyber threats on the rise, External Attack Surface Management is no longer optional—it’s essential. By implementing a robust EASM strategy, UK businesses can reduce their exposure to cyber risks, comply with data protection laws, and safeguard sensitive information.
At Data Protection People, we help organisations navigate the complexities of cybersecurity and compliance. If you need expert guidance on securing your external attack surface, get in touch with our team today!
Guide to External Attack Surface Management
The Ultimate Guide to External Attack Surface Management (EASM)
Organisations face an ever-expanding external attack surface that cybercriminals actively exploit. As businesses adopt cloud services, third-party integrations, and remote working solutions, the number of internet-facing assets grows, increasing the risk of cyber threats. External Attack Surface Management (EASM) has emerged as a critical security discipline, enabling organisations to continuously monitor, assess, and secure their digital perimeter. In this guide, we will cover:
- What an external attack surface is
- How cybercriminals exploit vulnerabilities
- The importance of EASM in cybersecurity
- How to implement an effective EASM strategy
- How to choose the right EASM solution for your business
What is an External Attack Surface?
The external attack surface refers to all the digital assets and entry points that are publicly accessible and can be targeted by cybercriminals. These assets include:
- Websites and web applications – Public-facing websites and online services often contain vulnerabilities such as outdated software, weak authentication, and misconfigurations, making them prime targets for attackers.
- Cloud platforms and SaaS solutions – Organisations rely on cloud services for storage and operations, but misconfigured permissions, publicly exposed storage, and inadequate security controls can lead to data breaches.
- VPNs and remote access tools – Remote access solutions provide essential connectivity but can be exploited through weak credentials, outdated encryption methods, or unpatched vulnerabilities.
- Exposed APIs and IoT devices – APIs act as gateways to critical systems and, if not secured properly, can be exploited by attackers to exfiltrate data or launch service disruptions. IoT devices, often deployed with default or hardcoded credentials, are also common attack vectors.
- Email servers and collaboration platforms – Attackers exploit poorly secured email servers and communication tools to conduct phishing attacks, compromise accounts, and distribute malware.
- Third-party integrations and supply chain connections – Many organisations depend on third-party software and services, but inadequate vendor security can introduce hidden vulnerabilities that cybercriminals leverage to gain unauthorised access.
The external attack surface is dynamic and continuously evolving as businesses undergo digital transformations, adopt new technologies, and engage with external partners. Every new digital asset—whether a website, cloud service, or IoT device—potentially expands an organisation’s attack surface. Without proactive monitoring and management, organisations may unknowingly expose sensitive data, increase their risk of targeted attacks, and become susceptible to cyber threats.
Key Risks of an Unmanaged External Attack Surface
- Data exposure due to misconfigurations in cloud storage, APIs, or web applications.
- Credential-based attacks, such as phishing and brute-force attacks, resulting in account takeovers.
- Exploitation of unpatched software, leading to malware infections and system compromises.
- Supply chain vulnerabilities, where attackers infiltrate organisations via less-secure third-party providers.
- Unmonitored shadow IT, where unknown and unapproved assets create security blind spots.
A well-defined External Attack Surface Management (EASM) strategy allows organisations to identify, monitor, and mitigate risks before attackers can exploit them.
How Cybercriminals Exploit External Attack Surfaces
1. Automated Scanning for Vulnerabilities – Cybercriminals deploy automated scanning tools to identify weak points in an organisation’s internet-facing infrastructure. These tools detect open ports, outdated software, misconfigured security settings, and publicly exposed services, making it easier for attackers to pinpoint potential entry points.
2. Exploiting Weak Credentials – Password security remains a major vulnerability. Attackers exploit weak or reused credentials through:
- Credential stuffing – Using leaked credentials from previous breaches to gain access to systems.
- Brute-force attacks – Systematically guessing passwords until the correct one is found.
- Phishing schemes – Deceiving users into revealing login credentials through fake websites and deceptive emails.
3. Targeting Misconfigured Cloud Services and APIs – Cloud misconfigurations are a major security risk. Attackers take advantage of:
- Publicly accessible cloud storage (e.g., misconfigured S3 buckets) to extract sensitive data.
- Unsecured APIs that lack authentication or rate-limiting, enabling mass data exfiltration.
- Weak identity and access management (IAM) policies, allowing unauthorised access to critical infrastructure.
4. Leveraging Third-Party Weaknesses – Supply chain vulnerabilities are a growing concern. Attackers target organisations by exploiting:
- Compromised vendor software to insert malicious code and infect downstream users.
- Insufficient security controls in third-party applications, providing indirect access to sensitive systems.
- Hijacked data transfers between organisations and partners to inject malware or steal confidential information.
5. Exploiting Unpatched Software – Cybercriminals frequently target outdated software to gain access to corporate networks. They:
- Identify systems running unpatched vulnerabilities and leverage publicly available exploits.
- Deploy ransomware and malware through unpatched entry points.
- Exploit legacy systems that are no longer supported by security updates.
By understanding these tactics, organisations can implement preventive measures to secure their external attack surface and reduce cyber risks.
The Importance of External Attack Surface Management (EASM)
EASM plays a critical role in modern cybersecurity by providing continuous visibility and risk management for internet-facing assets. Key benefits include:
- Comprehensive visibility – Organisations gain a full inventory of their digital footprint, including shadow IT and forgotten assets.
- Early threat detection – Identifying vulnerabilities before attackers exploit them reduces the likelihood of breaches.
- Risk prioritisation – Security teams can categorise threats based on impact and urgency, allowing for effective remediation.
- Regulatory compliance – Many industries require strict cybersecurity measures, and EASM helps ensure adherence to standards such as GDPR, NIST, and ISO 27001.
- Improved security posture – By proactively managing external risks, organisations can significantly reduce their exposure to cyber threats.
As cyber threats become more sophisticated, EASM is essential for preventing data breaches, ensuring business continuity, and maintaining customer trust.
Implementing an Effective EASM Strategy
1. Continuous Discovery and Inventory Management – Organisations must map out their external attack surface by continuously discovering and cataloguing all internet-facing assets, including shadow IT, legacy systems, and third-party integrations.
2. Risk Prioritisation and Threat Intelligence – Identifying vulnerabilities is not enough—security teams must prioritise them based on risk level, exploitability, and potential business impact. Threat intelligence should be incorporated to track emerging attack trends.
3. Automated and Real-Time Monitoring – Continuous scanning and monitoring help organisations detect newly exposed assets, identify misconfigurations, and remediate vulnerabilities before they can be exploited.
4. Incident Response and Threat Mitigation – An effective EASM strategy should integrate with SIEM (Security Information and Event Management) and SOAR (Security Orchestration, Automation, and Response) platforms to enable rapid threat detection and response.
5. Third-Party and Supply Chain Security – Since third-party vendors and cloud providers are part of the attack surface, organisations must conduct security assessments, monitor vendor risks, and ensure compliance with security policies.
6. Compliance and Regulatory Alignment – Organisations should align their EASM strategy with regulatory requirements such as GDPR, NIST, ISO 27001, and PCI-DSS to ensure compliance and mitigate legal risks.
7. Employee Awareness and Security Culture – Human error is a significant factor in cyber risks. Regular security training, phishing simulations, and credential management policies can help reduce the likelihood of successful attacks.
By implementing a structured and proactive EASM strategy, organisations can significantly reduce their exposure to external threats and enhance overall cybersecurity resilience.
Need expert guidance? Contact our cybersecurity specialists today to secure your external attack surface.
How to Become a Stand-Out DPO in the UK
How to Become a Stand-Out DPO in the UK
The role of the Data Protection Officer (DPO) has never been more important – or more in demand. Organisations across the UK are seeking experienced, trustworthy, and highly-skilled professionals to lead their data protection strategies, ensure regulatory compliance, and build a culture of privacy and accountability.
But what does it take to become a stand-out DPO in today’s evolving data protection landscape?
Whether you’re just starting your journey or looking to elevate your existing role, this article will guide you through the most important skills, qualifications, and resources to help you stand out as a DPO in the UK.
What Makes a Great DPO?
A Data Protection Officer (DPO) plays a pivotal role in ensuring an organisation’s compliance with the UK GDPR, the Data Protection Act 2018, and other privacy laws. But a truly effective DPO is much more than a compliance checker. The best DPOs are strategic, approachable, knowledgeable, and deeply committed to protecting personal data while supporting the broader goals of the business. When we hire at Data Protection People, passion and personality are as important as skill and experience.
If you’re considering a career as a DPO, or looking to stand out in your current role, here are the core attributes and skills that define excellence in the profession:
1. Legally Knowledgeable
At the heart of the DPO role is a firm understanding of data protection law. This includes the UK GDPR, Data Protection Act 2018, the Privacy and Electronic Communications Regulations (PECR), and increasingly, global laws such as the EU GDPR, CCPA (California), and emerging AI regulations.
A great DPO doesn’t just know what the law says — they understand how to interpret and apply it in real-world scenarios. They stay up to date with regulatory developments, landmark cases, and ICO guidance, and they can confidently assess how these affect their organisation’s data practices.
Tip: Reading ICO case studies, following the IAPP, and subscribing to Data Protection People’s weekly podcast are excellent ways to stay current with the law.
2. Pragmatic and Business-Savvy
Understanding the law is only one part of the role — applying it in a way that supports the organisation is where real value is added.
DPOs must strike a balance between legal compliance and commercial realities. A stand-out DPO will propose workable solutions, not just raise red flags. They help teams understand risk and provide options that meet both legal and operational goals.
This requires a strong grasp of how the business operates, its goals, its customers, and its technical infrastructure.
Example: Instead of saying, “You can’t do that,” a great DPO might say, “Here’s a lower-risk alternative that achieves your goal and complies with the law.”
3. Communicative and Personable
One of the most underrated skills of a successful DPO is their ability to communicate complex information in a clear and relatable way.
A great DPO can break down the principles of data protection and explain them in plain English to people in marketing, HR, IT, and leadership roles. They foster a culture of openness and awareness, helping others understand that data protection isn’t just a legal burden, but a shared responsibility.
Strong communication builds trust, and trust leads to better compliance.
Tip: If you’re a DPO in the making, practice explaining concepts like DPIAs or Article 6 lawful bases to someone outside your profession. This builds your confidence and clarity.
4. Independent and Objective
Under UK GDPR, a DPO must be independent. That means being able to act without undue influence, challenge decisions when needed, and offer impartial advice — even when it’s uncomfortable.
An excellent DPO maintains this independence while still being a collaborative team player. They have the confidence to say “no” when required but offer constructive feedback that supports decision-making.
They also understand how to navigate complex internal politics while maintaining their integrity.
A good DPO might challenge a data retention policy that exposes the company to unnecessary risk, even if it’s popular with senior leadership.
5. Respected and Trusted
A DPO must be someone colleagues trust and turn to — not just when something goes wrong, but as a valued advisor across the business. Gaining this trust takes time and consistency.
Respect is earned by providing timely, helpful advice, remaining calm under pressure, and demonstrating a clear understanding of the business’s needs.
Many of the best DPOs come from roles where they’ve built trust across departments and are known for being approachable, solution-focused, and fair.
Attend internal meetings regularly and make yourself available for informal chats. The more visible and accessible you are, the more people will come to you for guidance early in a project.
6. Adaptable and Curious
Data protection is an evolving field. Whether it’s new case law, the emergence of AI tools, or changes to international data transfer frameworks, the landscape is always shifting.
A stand-out DPO embraces this change. They’re curious, proactive learners who enjoy solving new problems and adapting quickly.
Being adaptable also means understanding the organisation’s changing needs — whether that’s digital transformation, mergers, or shifts in customer expectations — and responding in a way that keeps data protection aligned with business strategy.
For example, the rise of AI-powered recruitment tools requires new thinking about fairness, bias, and transparency — all areas where a forward-thinking DPO adds real value.
Developing These Qualities
None of these skills are innate — they’re developed over time through training, mentoring, hands-on experience, and a genuine passion for privacy.
Whether you’re stepping into your first data protection role or looking to sharpen your edge as a seasoned DPO, there are clear steps you can take to develop your capabilities:
Build a Strong Legal Foundation
Understanding the UK GDPR, the Data Protection Act 2018, PECR, and related laws is essential. You need more than just textbook knowledge — you must be able to interpret the law and apply it practically to different business contexts. Consider starting with formal training courses such as those offered by the IAPP (CIPP/E) or sector-specific qualifications. At Data Protection People, we offer hands-on training courses designed by experienced consultants, giving you the chance to explore real scenarios and learn how to apply legislation practically in your organisation.
Get Involved in Live Projects
One of the most effective ways to learn is through doing. Look for opportunities to support data audits, help with Subject Access Requests (SARs), review privacy notices, or assist with policy creation. Participating in these activities builds confidence and helps you understand how data protection theory applies in the real world.
Learn from Others
Shadowing experienced DPOs or joining internal and external working groups is an excellent way to gain insight into the challenges and decision-making processes that seasoned professionals navigate. It’s also a great way to build your network. Our Data Protection Made Easy podcast provides a platform where professionals at all levels share experiences, tools, and ideas. By tuning in — or joining live — you can earn CPE credits and pick up valuable knowledge in an accessible and engaging way.
Embrace Continuous Learning
The data protection landscape is constantly evolving — from legislative changes to new technologies like AI and biometrics. Staying informed is a non-negotiable part of the role. Subscribe to newsletters, attend events, take refresher courses, and follow industry thought leaders. At Data Protection People, we make this easier with regular updates, expert-led events, and access to ongoing professional development — helping you stay sharp and ahead of the curve.
Join a Supportive Community
You don’t have to navigate the path to becoming a great DPO alone. Engaging with a professional community gives you access to ideas, feedback, mentorship, and reassurance. Whether it’s through LinkedIn groups, industry forums, or platforms like the Data Protection Made Easy podcast, surround yourself with others who share your goals.
Which Qualifications Should a UK DPO Have?
Under the UK GDPR, there are no formal qualifications legally required to be appointed as a Data Protection Officer (DPO). However, in today’s competitive market, having recognised credentials can significantly improve your credibility, enhance your CV, and set you apart from other candidates. These qualifications show employers and stakeholders that you take your professional development seriously and understand the complexities of data protection law.
Professional Certifications
One of the most respected global providers of data protection qualifications is the International Association of Privacy Professionals (IAPP). IAPP certifications are widely recognised across both the public and private sectors, especially in global or multinational organisations. The most popular certifications for UK-based DPOs include:
-
CIPP/E – Certified Information Privacy Professional / Europe
Focused on European privacy laws, including the UK GDPR. This is a strong foundation for any UK-based DPO. -
CIPM – Certified Information Privacy Manager
Aimed at those managing or building privacy programmes. Excellent for leadership roles within data protection teams. -
CIPT – Certified Information Privacy Technologist
Perfect for professionals working at the intersection of privacy and technology, demonstrating competency in privacy-by-design and technical safeguards.
At Data Protection People, many of our consultants hold IAPP certifications. We align our training content with these standards, helping learners prepare for exams and apply their knowledge in real-world settings.
Academic Qualifications
For those looking to deepen their theoretical understanding, several UK universities now offer specialised degrees in data protection and information law. These include:
-
LLM (Master of Laws) in Information Rights Law and Practice
-
MSc in Information Governance and Data Protection
-
Postgraduate Diplomas and Certificates in Data Protection and Compliance
These programmes provide a high level of academic rigour and are often considered the pinnacle of data protection education in the UK.
It’s also worth noting that law degrees (LLB or LLM), even if not specifically focused on data protection, are highly transferable into the DPO role. A strong understanding of statutory interpretation, risk assessment, and ethical practice provides a solid foundation for success.
Practical Knowledge: The Most Valuable Asset
While qualifications are helpful, they are not a legal requirement, and more importantly, they don’t guarantee capability. The most successful DPOs are those who can apply the law in practice, adapt to their organisation’s unique risks, and implement scalable, real-world compliance strategies.
Many training courses focus heavily on the theoretical aspects of GDPR — but in reality, understanding how to interpret and implement those regulations in a business environment is what truly makes a DPO valuable.
That’s where Data Protection People stands out.
Our training courses are designed and delivered by experienced consultants who actively work with businesses across every sector. We don’t just teach what the law says — we show you how to apply it. Our courses include:
- Real-life case studies
- Templates and toolkits you can take away and use
- Practical exercises that simulate real compliance challenges
- Expert-led sessions that encourage interactive problem-solving
Whether you’re at the beginning of your data protection journey or looking to move into a senior role, our programmes provide both the knowledge and the confidence to thrive as a DPO.
What Tools Should a DPO Be Familiar With?
A strong DPO not only knows the law – they know how to apply it effectively. Here are some tools and platforms that can make a DPO more impactful:
- RoPA Management Tools – Maintain accurate Records of Processing Activities efficiently
- DSAR Management Systems – Tools for responding to Subject Access Requests quickly and compliantly
- Policy Management Software – Ensures that key documents are up to date and accessible
- Risk Assessment and DPIA Templates – For consistently evaluating high-risk processing activities
- Training & Awareness Platforms – Educating staff is one of a DPO’s most important duties
- Incident Response Tools – Have a clear plan and documentation for managing breaches
At Data Protection People, we offer bespoke toolkits and consultancy support to help DPOs not just understand their responsibilities, but implement them in a real-world environment.
Invest in Continuous Learning with Data Protection People
We understand that data protection isn’t one-size-fits-all. That’s why we offer flexible training courses designed by experienced consultants who have worked across sectors including education, healthcare, finance, housing, and local government.
Whether you’re looking for an introduction to GDPR, advanced DPIA training, or sector-specific insights, we provide:
- Live training sessions
- On-demand courses
- Bespoke in-house workshops
- Hands-on exercises and real-world case studies
Explore our Training Services to find a course that suits your career goals.
Earn CPE Credits Listening to Our Podcast
Every week, we host the Data Protection Made Easy Podcast – a free, interactive session where we discuss everything from GDPR enforcement actions and subject access requests to emerging technologies and ethical AI use.
Listeners can earn IAPP CPE credits simply by tuning in and participating in our sessions.
Can’t join us live? No problem. All our episodes are available on Spotify, Amazon Music, and other major platforms. You can also explore upcoming topics and register for future sessions on our Events Page.
Are You a Great DPO Looking for a New Challenge?
We’re always on the lookout for passionate, knowledgeable, and driven data protection professionals to join our team.
If you think you’ve got what it takes – or know someone who does – we encourage you to explore our open roles on our Job Opportunities Page and send us your CV.
Unlock Data Protection Expertise with the DPM Cert Training Course
DPM Cert Training Course
Understanding and navigating the complex landscape of data protection is crucial for businesses of all sizes. With new regulations constantly shaping the way organisations handle personal data, it’s no longer just a compliance requirement but a core component of building trust and safeguarding your reputation. At Data Protection People, we believe in making data protection simple and accessible, which is why we’re excited to offer our Certificate in Data Protection Management (DPM Cert) training course. Whether you’re a Data Protection Officer (DPO), a Privacy Advisor, or simply someone looking to enhance your understanding of data protection, our course is designed to provide you with the skills you need to succeed.
Why is Data Protection Training So Important?
Data protection laws are constantly evolving, and organisations face growing pressure to comply with regulations like the UK GDPR and the Data Protection Act 2018. The risks of non-compliance are significant, with penalties, reputational damage, and loss of consumer trust at stake. However, understanding the nuances of these laws can be challenging.
That’s where our DPM Cert comes in. Our training course offers a comprehensive foundation in data protection, focusing on essential principles of privacy, information rights, and lawful data processing. With a blend of practical skills and theoretical knowledge, this course will ensure you’re prepared to support data protection in any organisation.
Who Should Take the DPM Cert?
This course is ideal for:
- Data Protection Officers (DPOs)
- Data Protection Managers (DPMs)
- Privacy Advisors and Practitioners
- Compliance Professionals
- HR Personnel and IT Staff overseeing data protection
- Managers seeking to strengthen their understanding of data protection laws
Whether you’re new to the field or looking to build on your existing knowledge, our course is designed to provide you with the practical skills and legal understanding required to navigate today’s data protection landscape.
What You’ll Learn
The Certificate in Data Protection Management provides a robust curriculum that spans 12 weeks, combining theoretical knowledge with real-world application. Key topics covered include:
- Week 1: Understanding Data Protection Law
- Introduction to UK GDPR, the Data Protection Act 2018, and PECR.
- Week 2: Validating Your Use of Personal Data
- Understanding lawful basis for processing data and creating Records of Processing Activities (ROPAs) and Information Asset Registers (IARs).
- Week 3: Accountability for Personal Data
- The role of Data Controllers, the Board, Data Protection Officers, and the Information Commissioner’s Office (ICO) in ensuring compliance.
- Week 4: Risk and Personal Data
- Conducting Data Protection Impact Assessments (DPIAs) and embedding Data Protection by Design and Default into your organisation.
- Week 5: Individual Rights and Expectations
- Subject Access Requests (SARs), privacy information, direct marketing, and cookies regulations under the Privacy and Electronic Communications Regulation (PECR).
- Week 6: Working with Others
- Managing relationships with third-party processors and navigating data sharing, disclosures, and international transfers.
- Week 7: Security and Breaches
- Ensuring security under the GDPR and handling personal data breaches effectively.
- Week 9: Learner-Led Session, Recap, and Q&A
- A session for learners to consolidate their knowledge with interactive discussions and Q&A.
- Week 12: Open-Book Assessment
- A comprehensive open-book assessment featuring multiple-choice questions, scenario-based exercises, and practical application.
Why Train with Us?
At Data Protection People, we take a hands-on approach to data protection. Our course isn’t just about understanding the theory; it’s about applying that knowledge in real-world scenarios. Here’s what sets our course apart:
- Practical Learning: Real-world case studies and interactive discussions help you apply what you’ve learned.
- Expert Tutors: Our experienced instructors guide you through key concepts, ensuring you understand how to implement best practices in your organisation.
- Flexible Format: The course is designed with flexibility in mind, featuring one full-day workshop each week over nine weeks. Plus, you’ll have access to recorded sessions and additional reading materials to enhance your learning.
- Ongoing Support: Join a dedicated Microsoft Teams chat where you can ask questions and connect with both tutors and fellow participants. You’ll never be alone in your learning journey.
Built for Flexibility
We understand that time is valuable. That’s why our course is structured for maximum flexibility, with workshops held once a week from 09:30 to 15:30 over nine weeks. You’ll also benefit from a one-week revision period leading up to your open-book assessment. The sessions are delivered via Microsoft Teams, and all materials are recorded, so you can learn at your own pace and revisit content as needed.
Additionally, you’ll receive a digital copy of our comprehensive Information Governance Framework, ensuring you have access to the tools you need long after the course is complete.
Enrol Today and Simplify Data Protection in Your Organisation
Data protection doesn’t have to be complex. With the right knowledge, tools, and strategies, you can manage data protection confidently and effectively. Our Certificate in Data Protection Management equips you with the expertise to interpret and apply data protection laws, making compliance and security easier to navigate.
Take the first step towards mastering data protection and empowering your organisation. Sign up for the DPM Cert today!
With our expert guidance and flexible learning environment, you’ll finish the course ready to tackle the most pressing data protection challenges, all while ensuring your organisation remains compliant and secure.
Download our DPM Cert training brochure here!
Data Protection People Podcasts
Data Privacy Learning & Guidance
Joe Kirk’s Top 10 Tips
Joe Kirk’s Top 10 Tips: Lessons from a Career in Data Protection
In this special episode of the Data Protection Made Easy podcast, long-time host and data protection consultant Joe Kirk reflects on his journey through the world of privacy and compliance—from his early days in sales, speaking to hundreds of DPOs across the UK, to becoming a consultant himself and working with a wide range of clients across every major sector.
As this marks Joe’s final regular appearance on the podcast, we dedicated the session to the Top 10 Lessons He’s Learned over the last four years. These are practical, honest, and experience-based takeaways that he hopes will help current and aspiring DPOs make a meaningful impact in their roles.
Key Themes Discussed
- How sales and consulting provide different but complementary perspectives on data protection
- The common challenges DPOs face regardless of sector or organisation size
- The importance of empathy, curiosity, and communication in building trust
- Avoiding the “tick-box” mentality and becoming a strategic advisor
- Keeping your knowledge current in a fast-moving legal and tech landscape
- How to show your value to the business even when you’re not customer-facing
- Why DPOs should be involved in decision-making at the earliest possible stage
- Balancing legal risk with operational reality
- Encouraging a culture of accountability, not fear
- The importance of continuous learning – and what Joe would do differently if starting today
These tips are relevant whether you’re new to data protection, already in a DPO role, or even an employer looking to build a successful privacy function.
A Time of Transition for Data Protection Made Easy
Joe’s departure also marks the beginning of a new phase for the Data Protection Made Easy community. As we look to evolve and bring even more value to our subscribers, we’re making some important changes:
Podcast Frequency
We will now host one episode per month, instead of weekly. This allows us to:
- Deep dive into more meaningful topics
- Reintroduce guest speakers and expert panels
- Focus on sector-specific challenges and use cases
- Provide more actionable takeaways for our listeners
In-Person Events
To complement our podcast, we’ll be launching monthly in-person events, starting with a Housing Sector Roundtable in Leeds. These will be free to attend and packed with:
- Expert guest speakers
- Open discussion sessions
- Networking opportunities
- Food, drink, and sector-specific guidance
If you’re in the housing sector or work in data protection in Yorkshire, this is a great chance to connect with our team face-to-face. More info coming soon.
Monthly Newsletter
To replace our weekly GDPR Radio news episodes, we’ve launched a monthly email newsletter with:
- Top stories from the ICO and UK government
- Regulation changes and enforcement action recaps
- Insights from the Data Protection People team
- Highlights from recent podcasts and events
If you’re a subscriber, your first issue should already be in your inbox! If not, sign up here:
What’s Next?
We’ll soon be publishing a full article on Joe’s Top 10 Tips for DPOs, expanding on the episode with real-life examples, links to useful tools, and guidance from our team. This will be available in the Resource Centre and shared with our newsletter subscribers.
We’ll also be sharing details on our 10-Year Anniversary Celebration taking place in July 2025. If you’re based in Leeds and would like to attend this free event, keep an eye out for the invitation — food, drinks, music, and privacy professionals all under one roof (plus a special guest DJ set from Joe himself!).
Keep in Touch with Joe
While Joe is stepping away from the podcast, you may still hear him pop up as a guest speaker in future episodes or events. He’s made a lasting impact on our community and we’d love for you to stay connected with him: Connect with Joe on LinkedIn
Catch Up On Demand
Listen to Episode 213 – Joe Kirk’s Top 10 Tips on Spotify
Or find us on Apple Podcasts, Amazon Music, and all major streaming platforms.
Thank you to Joe for four years of thoughtful, passionate, and incredibly valuable contributions to the Data Protection Made Easy community. We’ll miss him as a regular host, but we know this isn’t goodbye – just see you later.
GDPR Radio – Episode 212
GDPR Radio – Data Protection News of the Week
In Episode 212 of GDPR Radio, the news-focused arm of the Data Protection Made Easy podcast, our hosts Phil, Catarina, and Joe returned to unpack the latest headlines and developments in the world of data protection.
This interactive session offered an hour of engaging, thought-provoking discussion with a live audience made up of DPOs, legal professionals, cyber security experts, and privacy enthusiasts. As always, we covered what matters most to the data protection community—breaking down key cases, legislative shifts, and industry commentary in a simple, digestible way.
What We Discussed
In this episode, we explored:
-
Latest ICO enforcement actions and what they mean for organisations in regulated sectors
-
Notable data breaches from the past fortnight and the implications for incident response practices
-
The future of AI & consent – how regulators are shaping their approach to emerging technologies
-
UK data reform updates and their impact on DPO responsibilities
-
Plus, we answered live questions from our audience in real-time!
Whether you joined us live or plan to catch up later, Episode 212 was packed with valuable insights for data protection professionals at all levels.
How to Join Future Episodes
We host live podcast episodes every Friday between 12:30 and 13:30. These sessions are free to attend and open to anyone with an interest in data protection or cyber security. To receive weekly invitations straight to your inbox, simply sign up via our website:
👉 Subscribe to Podcast Invites
Earn IAPP CPE Credits
Listening to Data Protection Made Easy live or on-demand may qualify you for Continuing Professional Education (CPE) credits with the IAPP. Attendees can self-certify their participation by keeping a record of attendance or listening history.
Be Part of the Community
The Data Protection Made Easy podcast isn’t just a podcast—it’s a growing community. With over 1,500 subscribers and 200+ episodes, we’re proud to offer a space where professionals can learn, share ideas, and stay ahead of the curve. Each week, our live chat is buzzing with questions, opinions, and useful links from fellow practitioners.
Catch Up On Demand
Missed the live session? You can listen to Episode 212 and all previous episodes on Spotify, Amazon Music, Apple Podcasts, or wherever you get your podcasts.
🎧 Listen to GDPR Radio – Episode 212 on Spotify
Let us know what you thought of the episode or share a topic you’d like to see covered in a future edition of GDPR Radio!
How to Stand Out as a DPO
How to Stand Out as a DPO – Episode 211 of the Data Protection Made Easy Podcast
In this week’s episode of the Data Protection Made Easy podcast, our expert hosts Joe Kirk, Catarina Santos, and Phil Brining came together to explore one of the most popular and debated topics in the data protection space: what it takes to stand out as a Data Protection Officer (DPO) in today’s fast-evolving landscape.
With over 200 episodes under our belt, Data Protection Made Easy has always been about honest, accessible conversations—and this one was no different. Episode 211 sparked lively discussion, professional debate, and some healthy disagreements between our hosts, all of which reflect the complexity and diversity of views in our field.
We tackled the key ingredients that make a truly exceptional DPO:
- What skills separate a great DPO from a good one?
- How much does certification and formal training matter?
- Is legal knowledge more important than technical awareness?
- How do you build influence within an organisation as a DPO?
- What are hiring managers really looking for in a data protection lead?
One of the biggest takeaways from this episode is that there is no single “correct” route to becoming a successful DPO. Some of our speakers emphasised strong legal backgrounds, while others focused on communication, pragmatism, and an understanding of real-world implementation. It’s this range of perspectives—and the opportunity for our community to challenge and expand on them—that makes our podcast so valuable.
Whether you’re:
- An aspiring DPO looking to break into the industry,
- A practicing DPO interested in sharpening your approach,
- Or an employer or recruiter trying to understand what makes an impactful DPO,
this episode is packed with practical advice, reflection, and a few strong opinions that will get you thinking.
Want to Join the Conversation?
Our sessions are completely free to join and happen live every Friday from 12:30 – 13:30 (UK time) via Microsoft Teams. When you attend live, you’ll be part of our interactive chat, gain access to shared resources, and have the opportunity to ask questions or share your perspective.
If you can’t make it live, don’t worry—every episode is available on Spotify and all major streaming platforms so you can catch up any time.
👉 Subscribe to join future episodes
🎧 Listen back on Spotify
📩 Or sign up to receive weekly invites straight to your inbox.
Up Next: Episode 212 – GDPR Radio
Join us next Friday for GDPR Radio, our fortnightly roundup of data protection news, enforcement actions, and thought-provoking discussions. If you want to stay ahead of regulatory developments and understand what’s shaping our industry in real time, this is the place to be.
Thank you for being part of the Data Protection Made Easy community—see you next week!
Are Verbal Discussions Caught by the GDPR?
Data Protection Made Easy: Episode 210
Are Verbal Discussions Caught by the GDPR?
On Friday, 8th March, we hosted Episode 210 of the Data Protection Made Easy podcast — another packed session of GDPR Radio, our fortnightly deep dive into the biggest headlines and hot topics in the world of data protection and privacy.
Hosted by Phil Brining, Joe Kirk, and Caine Glancy, this episode delivered a healthy blend of practical insight, thought-provoking discussion, and plenty of live audience participation from our growing community of data protection professionals. We were once again joined by over 100 live listeners, all contributing ideas and questions via our interactive Microsoft Teams chat.
What We Discussed
1. Are Verbal Discussions Caught by the GDPR?
This episode’s title topic sparked a lively conversation. Our hosts explored whether verbal exchanges — such as internal meetings, phone calls, and spoken instructions — fall under the scope of the UK GDPR. The discussion unpacked key principles such as the definition of “processing”, whether recording or note-taking changes the legal position, and how organisations should manage verbal communication when it contains personal data.
This sparked some brilliant insights from both the hosts and the live audience. We covered scenarios in HR, support desks, and customer service, offering practical advice for DPOs and compliance professionals who might be navigating grey areas in their organisations.
2. Prince Harry and the Visa Controversy
We also turned our attention to the news story making international headlines: Prince Harry’s visa application and the allegations that contradict information he disclosed in his autobiography. Our team explored the privacy, transparency, and data-sharing implications of the case, and how international jurisdictions handle cross-border data issues differently — a useful case study in the growing complexities of public disclosure and personal data rights.
What’s Coming Up Next: Episode 211 – Becoming an Impactful DPO
Next Friday, 15th March, we’re proud to host Episode 211 of the Data Protection Made Easy podcast – a special session titled:
“Standing Out as a DPO – What Makes a High-Quality Data Protection Officer”
Whether you’re an experienced Data Protection Officer, a practitioner looking to step up, or someone hiring for DPO roles, this is a session not to be missed.
We’ll cover:
- What makes a great DPO stand out in today’s landscape
- The skills and attributes that employers are really looking for
- Career development tips for DPOs – from training to certifications and soft skills
- How to differentiate yourself during job interviews
- What to say (and what not to say!) when looking for your next opportunity
- Key qualities that help DPOs influence, lead, and deliver real change within organisations
This session will be hosted by Phil Brining, Caine Glancy, and Joe Kirk, and is aimed at anyone working in or alongside data protection, whether you’re job hunting, recruiting, or simply looking to refine your skills.
At Data Protection People, we’re always on the lookout for bright and brilliant DPOs to join our team. If you, or someone you know, is actively looking for a new challenge in data protection, feel free to send a CV to one of our team members or reach out via our website.
Why Join the Podcast Live?
Our podcast is more than just a listen-along — it’s a live, interactive community of like-minded professionals. Each week, our hosts are joined by a growing audience of data protection, privacy, and cyber security practitioners, who participate live via Microsoft Teams.
By joining us live, you can:
- Ask questions in real-time
- Get involved in live polls and discussions
- Access links to useful resources shared during the session
- Network with others in the field
And best of all — it’s completely free to join!
Can’t Make It Live?
No problem. Every episode of the Data Protection Made Easy podcast is uploaded to Spotify, Amazon Music, and all other major streaming platforms. So whether you want to rewatch a session or catch up on our back catalogue of over 200 episodes, it’s all available for you — whenever it suits your schedule.
📅 View Upcoming Events & Register to Join Live
Subscribe to Join Us Weekly
Subscribing is easy and ensures you receive an invite to each live episode. We host our sessions every Friday at 12:30PM, alternating between topical discussions and GDPR Radio — both designed to keep you informed, compliant, and ahead of the curve.
Visit our events page and sign up once to join our mailing list and receive weekly invites, reminders, and access to all the extras shared in the live sessions.
Data Protection Made Easy
By practitioners, for practitioners. Making complex subjects easier, every Friday.
Data Protection People Whitepapers
Data Privacy Learning & Guidance
How to Respond to a Data Subject Access Request (DSAR)
Read about how to properly handle a Data Subject Access Request (DSAR) as a data controller at an organisation who has received a request.
Do I need to do a DPIA?
Learn about Data Protection Impact Assessments (DPIAs) and how to manage them.
Data within Education
Data within Education Having joined Data Protection People as a graduate fresh from finishing Leeds Beckett University, my knowledge of GDPR and data protection was virtually non-existent, I was well and truly thrown in the deep end. You could say it was like learning how to run before I could walk. Luckily alongside having to…
Outsourced Consultant Versus In-House?
Do I need to do a DPIA? Whenever you implement a new processing activity, system, or process, you should consider whether a DPIA is needed. This should be done as early as possible in the process to allow time for the implementation of risk mitigation. Step One: is a DPIA legally required? The first thing…
Join our community
Our mission is to make data protection easy: easy to understand and easy to do. We do that through the mantra of benchmark, improve, maintain.