Threat Modeling for Schrems II

A talk by Dinis Cruz, James Bore and David Clarke
Open Security Summit CIC, Bores Security Consultancy Ltd and GDPRUK

Register to watch this content

By submitting your email you agree to the Terms of Service and Privacy Statement
Watch this content now

Tracks covered by this talk

About this talk

In preparation for the Security Labels & Schrems II session that is happening on Thursday, in this session we will be executing a Threat Model exercise aimed at mapping out the multiple Threat Modeling components of the scenarios affected by "Schrems II" (Threat Actors, Data Flows, Use Cases, Security Boundaries, Vulnerabilities and Risks)

Schrems II

As per the Schrems II ruling, the US is no longer an adequate country for EU personal data. BCS recently did a recent webinar on the legal aspects which you can see here

So far, the ICO guidance in the UK is to map your data flows in preparation for further guidance.

See also:

See also this page at the Open Security Summit website

David Clarke

Author of the only online course on Breach Management course that is APMG/GCHQ Certified. Who’s Who in Cybersecurity? 2020 Top 10 influencersin GRC by Thompson Reuter’s 2017 Top Privacy and Thought Leader Thinkers360 2020 Telensa Top 50 Smart City Influencers 2019 The top 50 list of Global Experts by Kingston Technology Top 20 Global Tech Influencers by @Thinkers360 2020 No 2 Thinkers360 Cybersecurity June Top 100 B2B Thought Leaders and Influencers to Follow in 2020 #15 Top 100 social media experts to follow on twitter #59 2016 The DPO 200 in association with GDPR Data Protection World Forum , Top 50 thought leaders on BYOD #44 2014 Top top 50 thought leaders on BYOD iot #37 2017 Top 100 influencers and brands bigdata #86 2017 Top 100 influencers, brands and publications IOT #35

Sponsor this Event

Your logo could go here!

If you'd like to get your brand in front of attendees contact us.