Attend our webinars to learn more about IT risk management, information security management, ISO standards, the EU GDPR, and more.

 

Skip to live webinars

Skip to on-demand webinar

Live webinars

webinar-icon.png

 

Webinar ENG: Understanding the Pitfalls in the IT Risk Management Process

Tuesday, April 25, 2017, 11:00 AM - 11:45 AM CEST

Attend Button.jpg


 

webinar-icon.png

 

Webinar DE: DSGVO - Wie schwierig kann das sein?

Donnerstag, 27. April 2017, 14:00 - 14:40 MESZ

Attend Button.jpg


 

webinar-icon.png

 

Webinar DA: EU Persondatabeskyttelse - hvor svært kan det være?

Tirsdag, den 9. maj 2017 kl. 13.00 - 13.30

Attend Button.jpg


 

webinar-icon.png

 

Webinar ENG: The EU Data Protection Regulation - How Hard Can It Be?

Tuesday, May 9, 2017, 2:00 PM - 2:30 PM CEST

Attend Button.jpg


 

webinar-icon.png

 

Webinar DA: EU persondatabeskyttelse - sådan dokumenterer du effektivt din organisations efterlevelse

Tirsdag, May 16, 2017, kl. 13 - 13.45

Attend Button.jpg


 

webinar-icon.png

 

Webinar ENG: EU Data Protection Regulation - How to document your organisation’s compliance

Tuesday, May 16, 2017, 2:00 PM - 2:45 PM CEST

Attend Button.jpg


 

 Kursus_web4.png

Seminar om persondataforordningen:
Overblik, implementering og kontinuerlig efterlevelse

30. maj og 13. juni i København

8. juni i Aarhus

Attend Button.jpg


 

 Kursus_web4.png

Kursus 1 - 4: Ledelse af it-sikkerhed

12. september 2017 kl. 09:00 CET

IDA Mødecenter, København V, Denmark

Attend Button.jpg


 

On-demand webinars

Did you miss these? Get access to some of our previous webinars:

webinar-icon.png

 

Webinar: The EU Data Protection Regulation - How Hard Can It Be? 

Access our webinar The EU Data Protection Regulation - How Hard Can It Be? During the webinar we take you through the new regulation and show you easy ways to comply with it.

Access Button.jpg


 

 webinar-icon.png

 

Webinar: ISO 27001 Policy&Compliance 

Access our webinar ISO 27001 Policy&Compliance. During the webinar we will show you how to use the widespread standards for information security, ISO 27001 and -2, to take control of your information security and meet security requirements.

 Access Button.jpg