Back to blog

On-demand Webinar: Office 365 and GDPR

21 Aug 2018 by emma.robinson

Our incredibly popular webinar is now available on-demand. Register to watch it here: GDPR and Office 365: Surviving the Aftermath.

How can you survive the GDPR aftermath?

At Inspire in July, Microsoft MVP and Quadrotech CTO Paul Robichaux presented his much-anticipated session GDPR and Office 365: Surviving the Aftermath

Due to its popularity, Paul has recorded an encore session, for those who were unable to make it to the presentation, or Inspire itself.

Let’s take it back to pre-May 25th

Many companies faced a serious (and sometimes slightly frenzied) challenge to get compliant in time for May 25th – the deadline for GDPR. Many organizations claimed that they underestimated the amount of time and consideration needed to review their processes, take any required steps, and get sufficient data protection measures in place. A quick Google search in April would pull up various statistics and (often scare-mongering) studies indicating that companies were unprepared, under-informed, and in some cases, unsure where to even start.

The deadline has passed, but that doesn’t mean the work is over

The deadline for GDPR was by no means the finish line, although for some it may have felt that way… The General Data Protection Regulation, and its requirements should be entrenched in everyday business processes, and ongoing reviews and refinements should be made to make improvements, bolster protective efforts, and keep sensitive data safe. Office 365 is a hub for information and collaboration, and a typical organization’s environment is absolutely teeming with data. It is crucial that this environment is audited, identified, and protected on an ongoing basis.

Skip forward to today: What do you need to know about GDPR in Office 365?

If you want to find out about key considerations for ongoing GDPR compliance in Office 365, including:

  • How to simplify GDPR by focusing on the technologies and processes they can control.
  • The various types of ‘breach’ – it’s not just malicious external attacks that you need to defend against.
  • You obligations (should an incident occur), such as detection, scoping, reporting, notification, and remediation

This is a must-watch session so register now to watch. Simply fill in your details and we’ll send you an on-demand copy to stream.