Book a demo form

Book a demo

E8 Brochure Campaign Traffic

Resource Download

Contact Us

Signup Form (Blog Page and Resources Page)

Services Signup (MSSP page popup)

MITRE Att@ck Download (SEIM Pages 2021)

Book a demo form

Landing page - free trial form

Book a demo

E8 Brochure Campaign Traffic

Landing page - E8 demo form

Download the SmartCheck Brochure

Request SmartCheck for Ransomware Demo

SmartCheck for Ransomware Demo

SmartCheck Demo LP

SmartCheck Demo LP 2

MITRE ATT@CK Webinar - Jun 2022

you must read and acknowledge our privacy policy

July 2022 Landing Page (Brochure Download)

  • This field is for validation purposes and should be left unchanged.

July 2022 Landing Page (Director)

  • This field is for validation purposes and should be left unchanged.

Insurance - 25 Minute Q&A

  • This field is for validation purposes and should be left unchanged.

Insurance - Checklist Download

  • This field is for validation purposes and should be left unchanged.

GDPR Compliance Solutions for Cyber Security


The 5 Cyber Security clauses within GDPR

The EU General Data Protection Regulation (GDPR) is a regulatory framework for data protection and privacy that came into effect on 25th May 2018. It includes 99 articles or clauses covering virtually every aspect of business and information management – everything from the consent to collect and process information, to the “right to be deleted”. Importantly for global businesses (including those outside the EU) the GDPR is supra-national, therefore any business that processes the data of EU citizens will fall under its remit, not just European businesses.

For cyber security professionals, the drive for data protection and information management is not new; although the level of detail, the requirements on data breach notification and the fines in GDPR impose a lot more focus. There are five individual articles or clauses that have specific cyber security requirements:
The five GDPR clauses for cyber security

How to comply with the 5 cyber security clauses of GDPR

For security monitoring and operations in GDPR compliant businesses there is increased focus on both prevention and avoidance of security and privacy breaches. Further, it is imperative to be able to respond quickly when a problem does occur, understand it and take action. The 72 hours allowed to notify the government authority is accompanied by an expectation that affected data subjects will be communicated with promptly. As a minimum, businesses handling personal data will need to:

  • Continuously monitor evidence and records around data transactions and breaches with comprehensive collection, processing and storage of activity logs;
  • Detect and respond to issues quickly to comply with notification rules and reduce fines by demonstrating effective controls, oversight and containment of breaches;
  • Achieve demonstrable compliance to GDPR as well as meeting business needs.

Knowing where to start with the implementation of the 5 cyber security clauses of GDPR is key to success. Would you like to find out how? Our Fast Track GDPR Guide will help you:

  • Develop a credible stance for your GDPR cyber security compliance and reporting to management
  • By providing a GDPR cyber security implementation plan
  • Support your team with practical examples of what implementation should look like

Download the Fast Track Your GDPR Compliance Guide

How Huntsman Security solutions helps with your GDPR compliance

Enterprise SIEM

Huntsman Security’s Enterprise SIEM software provides flexibility, visibility and effective use of resources in security monitoring, information protection and breach response to deliver the following:

  • Accurate and continuous view of compliance
  • Reliable metrics for governance review
  • Instantly identifies compliance issues, breaches, unauthorised accesses and data flows for remediation
  • Operates across cloud, on-premise or hybrid environments
  • Enables a rapid response to minimise fines if a breach occurs

Essential 8 Scorecard

The Essential 8 Scorecard provides continuous measurement of key security controls to prevent, limit and recover from breaches by:

  • Interrogating security management systems to validate control configuration and operation
  • Monitoring activity and security settings
  • Automating report generation and despatch to key stakeholders
  • Allowing real-time visibility of cyber posture and control risks

Download Enterprise SIEM Brochure Download Essential 8 Scorecard Brochure

Find out more about GDPR compliance solutions

white paper what GDPR means to UK businesses

Enterprise SIEMEmail for More Info