{"id":10283,"date":"2022-04-20T13:45:46","date_gmt":"2022-04-20T13:45:46","guid":{"rendered":"https:\/\/cyber-fortified.com\/m\/?page_id=10283"},"modified":"2022-04-26T11:54:17","modified_gmt":"2022-04-26T11:54:17","slug":"role-of-the-data-protection-officer","status":"publish","type":"page","link":"https:\/\/cyber-fortified.com\/m\/role-of-the-data-protection-officer\/","title":{"rendered":"Mastering the Role of the Data Protection Officer"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"10283\" class=\"elementor elementor-10283\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9c11d19 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"9c11d19\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-240b5c7 jltma-glass-effect-no\" data-id=\"240b5c7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-30ffd16 jltma-glass-effect-no elementor-widget elementor-widget-image\" data-id=\"30ffd16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"2560\" height=\"1163\" src=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/shutterstock_241742725-cover-scaled.jpg\" class=\"attachment-full size-full wp-image-10392\" alt=\"\" srcset=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/shutterstock_241742725-cover-scaled.jpg 2560w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/shutterstock_241742725-cover-300x136.jpg 300w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/shutterstock_241742725-cover-1024x465.jpg 1024w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/shutterstock_241742725-cover-768x349.jpg 768w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/shutterstock_241742725-cover-1536x698.jpg 1536w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/shutterstock_241742725-cover-2048x931.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2d8960e elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"2d8960e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-74660e7 jltma-glass-effect-no\" data-id=\"74660e7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f4d57e1 jltma-glass-effect-no elementor-widget elementor-widget-heading\" data-id=\"f4d57e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-large\">Mastering the Role of the Data Protection Officer<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35e6a5c elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"35e6a5c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-da758fd jltma-glass-effect-no\" data-id=\"da758fd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c432f1f jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"c432f1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Overview<\/strong><\/p><p>Data Protection Officers (and Data Protection Leads) continue to be challenged in their roles, particularly the continued minefield of data protection and the ever-evolving and emerging threats in cyber security.<\/p><p>After all, the DPO is considered (and expected to be) a \u201ckey player\u201d in the data protection culture of any organisation.<\/p><p>The course will address the ever-evolving challenges that the DPO role faces. Using real-world case studies, as well as reviewing why the role needs to evolve (and how). This is a comprehensive refresher course that DPOs can ill-afford to not attend.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d7370a9 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"d7370a9\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6c2f1f0 jltma-glass-effect-no\" data-id=\"6c2f1f0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ab29db5 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"ab29db5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Course Objectives<\/strong><\/p><ul><li>Understand the overall role of the DPO and how it has changed<\/li><li>Effectively review the organisational Data Protection Strategy<\/li><li>Responsibilities of the DPO<\/li><li>Past, Current and Future challenges of the DPO role<\/li><li>Data Protection vs Cyber Security<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-45ccc0c elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"45ccc0c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-8591fa0 jltma-glass-effect-no\" data-id=\"8591fa0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9c2f37b jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"9c2f37b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Course Content<\/strong><\/p><ul><li>Defining the role of the Data Protection Officer<\/li><li>The Evolving Role of the Data Protection Officer<\/li><li>Common Compliance &amp; Security Mistakes<\/li><li>Emerging Threats<\/li><li>Case Studies<\/li><li>Identifying Risks<\/li><li>Building your Data Protection Strategy<\/li><li>Interactive Sessions<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f175110 jltma-glass-effect-no\" data-id=\"f175110\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1df9ded jltma-glass-effect-no elementor-widget elementor-widget-image\" data-id=\"1df9ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"720\" height=\"481\" src=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/shutterstock_790265656-vreduced.jpg\" class=\"attachment-large size-large wp-image-10303\" alt=\"\" srcset=\"https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/shutterstock_790265656-vreduced.jpg 842w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/shutterstock_790265656-vreduced-300x200.jpg 300w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/shutterstock_790265656-vreduced-768x513.jpg 768w, https:\/\/cyber-fortified.com\/m\/wp-content\/uploads\/2022\/04\/shutterstock_790265656-vreduced-272x182.jpg 272w\" sizes=\"(max-width: 720px) 100vw, 720px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f3d8276 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"f3d8276\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cc84e66 jltma-glass-effect-no\" data-id=\"cc84e66\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b02f586 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"b02f586\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Who is this coursed aimed at?<\/strong><\/p><p>The course is aimed at the SME sector and is suitable across multiple industries. In particular, those within the financial, legal, retail and hospitality industries.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7a96b77 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"7a96b77\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-83184a7 jltma-glass-effect-no\" data-id=\"83184a7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d911972 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"d911972\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Next Steps<\/strong><\/p><p>Learn how our courses can help your business build your employees into a strong first line of defence.<\/p><p>Get in touch with us, today, to book your complimentary scoping call with our training team.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-07206f4 elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"07206f4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0752ec8 jltma-glass-effect-no\" data-id=\"0752ec8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d22b4da jltma-glass-effect-no elementor-widget elementor-widget-html\" data-id=\"d22b4da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<!-- Calendly inline widget begin -->\n<div class=\"calendly-inline-widget\" data-url=\"https:\/\/calendly.com\/cyberfortified\/scoping-call-training?hide_gdpr_banner=1\" style=\"min-width:320px;height:700px;\"><\/div>\n<script type=\"text\/javascript\" src=\"https:\/\/assets.calendly.com\/assets\/external\/widget.js\" async><\/script>\n<!-- Calendly inline widget end -->\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Mastering the Role of the Data Protection Officer Overview Data Protection Officers (and Data Protection Leads) continue to be challenged in their roles, particularly the continued minefield of data protection and the ever-evolving and emerging threats in cyber security. After all, the DPO is considered (and expected to be) a \u201ckey player\u201d in the data [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-10283","page","type-page","status-publish","hentry","post"],"_links":{"self":[{"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/pages\/10283","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/comments?post=10283"}],"version-history":[{"count":25,"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/pages\/10283\/revisions"}],"predecessor-version":[{"id":10644,"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/pages\/10283\/revisions\/10644"}],"wp:attachment":[{"href":"https:\/\/cyber-fortified.com\/m\/wp-json\/wp\/v2\/media?parent=10283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}