{"id":10267,"date":"2022-04-20T13:11:15","date_gmt":"2022-04-20T13:11:15","guid":{"rendered":"https:\/\/cyber-fortified.com\/m\/?page_id=10267"},"modified":"2022-04-26T11:51:49","modified_gmt":"2022-04-26T11:51:49","slug":"data-protection-versus-cyber-security","status":"publish","type":"page","link":"https:\/\/cyber-fortified.com\/m\/data-protection-versus-cyber-security\/","title":{"rendered":"Data Protection vs Cyber Security"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"10267\" class=\"elementor elementor-10267\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9c11d19 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"9c11d19\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-240b5c7 jltma-glass-effect-no\" data-id=\"240b5c7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-30ffd16 jltma-glass-effect-no elementor-widget elementor-widget-image\" data-id=\"30ffd16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1100\" height=\"600\" src=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/shutterstock_1936906645-red.jpg\" class=\"attachment-full size-full wp-image-10269\" alt=\"\" srcset=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/shutterstock_1936906645-red.jpg 1100w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/shutterstock_1936906645-red-300x164.jpg 300w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/shutterstock_1936906645-red-1024x559.jpg 1024w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/shutterstock_1936906645-red-768x419.jpg 768w\" sizes=\"(max-width: 1100px) 100vw, 1100px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2d8960e elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"2d8960e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-74660e7 jltma-glass-effect-no\" data-id=\"74660e7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f4d57e1 jltma-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"f4d57e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-large\">Data Protection vs Cyber Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35e6a5c elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"35e6a5c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-da758fd jltma-glass-effect-no\" data-id=\"da758fd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c432f1f jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"c432f1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Overview<\/strong><\/p><p>During this course, we look at the real stories from the front line of GDPR &amp; CCPA. Not just the high-profile breaches, reported in the news, but those near-misses and fatal mistakes of smaller businesses.<\/p><p>This is an opportunity for businesses to learn from the mistakes of others, whilst hearing about the challenges that their counterparts have been facing. Rather than succumbing to misinformation or, even worse, indifference, this seminar will seek to empower your organisation\u2019s workforce through shared learning, giving them the tools to develop a robust data protection and cyber security strategy.<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d7370a9 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"d7370a9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6c2f1f0 jltma-glass-effect-no\" data-id=\"6c2f1f0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ab29db5 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"ab29db5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Course Objectives<\/strong><\/p><ul><li>Understand that operational compliance is just the first step to an ongoing data protection programme<\/li><li>Learn tangible lessons from the real-world data breaches<\/li><li>Difference between compliance and cyber risks<\/li><li>Common risks that every business will face, irrespective of size<\/li><li>Debunk misconceptions about Data Protection legislation that still exist<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45ccc0c elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"45ccc0c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-8591fa0 jltma-glass-effect-no\" data-id=\"8591fa0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9c2f37b jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"9c2f37b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Course Content<\/strong><\/p><ul><li>GDPR as a Blueprint<\/li><li>GDPR vs CCPA<\/li><li>Data Mapping<\/li><li>Data Handling Best Practice<\/li><li>Securing your Supply Chain<\/li><li>Types of Data Breaches<\/li><li>Real World Case Studies<\/li><li>Common Cyber Security Mistakes<\/li><li>Identifying Risks<\/li><li>Compliance and Cyber Risk Management<\/li><li>Interactive Sessions<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f175110 jltma-glass-effect-no\" data-id=\"f175110\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1df9ded jltma-glass-effect-no elementor-widget elementor-widget-image\" data-id=\"1df9ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"720\" height=\"507\" src=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/shutterstock_1221380791-red.jpg\" class=\"attachment-large size-large wp-image-10277\" alt=\"\" srcset=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/shutterstock_1221380791-red.jpg 975w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/shutterstock_1221380791-red-300x211.jpg 300w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/shutterstock_1221380791-red-768x540.jpg 768w\" sizes=\"(max-width: 720px) 100vw, 720px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f3d8276 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"f3d8276\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cc84e66 jltma-glass-effect-no\" data-id=\"cc84e66\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b02f586 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"b02f586\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Who is this coursed aimed at?<\/strong><\/p><p>The course is aimed at the SME sector and is suitable across multiple industries. In particular, those within the financial, legal, retail and hospitality industries.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7a96b77 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"7a96b77\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-83184a7 jltma-glass-effect-no\" data-id=\"83184a7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d911972 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"d911972\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Next Steps<\/strong><\/p><p>Learn how our courses can help your business build your employees into a strong first line of defence.<\/p><p>Get in touch with us, today, to book your complimentary scoping call with our training team.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-07206f4 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"07206f4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-69f24e4 jltma-glass-effect-no\" data-id=\"69f24e4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e721633 jltma-glass-effect-no elementor-widget elementor-widget-html\" data-id=\"e721633\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<!-- Calendly inline widget begin -->\n<div class=\"calendly-inline-widget\" data-url=\"https:\/\/calendly.com\/cyberfortified\/scoping-call-training?hide_gdpr_banner=1\" style=\"min-width:320px;height:700px;\"><\/div>\n<script type=\"text\/javascript\" src=\"https:\/\/assets.calendly.com\/assets\/external\/widget.js\" async><\/script>\n<!-- Calendly inline widget end -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Data Protection vs Cyber Security Overview During this course, we look at the real stories from the front line of GDPR &amp; CCPA. Not just the high-profile breaches, reported in the news, but those near-misses and fatal mistakes of smaller businesses. This is an opportunity for businesses to learn from the mistakes of others, whilst [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-10267","page","type-page","status-publish","hentry","post"],"_links":{"self":[{"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/pages\/10267","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/comments?post=10267"}],"version-history":[{"count":13,"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/pages\/10267\/revisions"}],"predecessor-version":[{"id":10638,"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/pages\/10267\/revisions\/10638"}],"wp:attachment":[{"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/media?parent=10267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}