We’ve been hit, how can CyberDefenses help? Incident Hotline

Cyber Defenses Academy

GDPR Training



Product Description

Become a GDPR-qualified Data Protection Officer (DPO) through four days of in-person classes encompassing key elements of the IAPP’s European Data Protection and Privacy Program Management training.  This class is specifically tailored for US Based companies that manage or monitor the personal information of EU individuals, therefore falling under the requirements of the GDPR and requiring a Data Protection Officer.  This course content is based upon the IAPP Certified Information Privacy Professional for Europe (CIPP/E) and Certified Information Privacy Manager (CIPM).

CyberDefenses faculty, in conjunction with the IAPP, with academic and practice experience teaches the essentials of envisioning, designing and executing a comprehensive privacy management program within GDPR requirements. Classes cover pan-European and national data protection laws, key privacy terminology, and the practical concerns around personal data protection and trans-border data flows. They equip you to monitor compliance, manage internal data protection activities, train data processing staff, conduct internal audits, and more.

With the deadline for GDPR compliance looming, companies are searching for DPO candidates with the requisite knowledge and skills. These training programs are based off the body of knowledge for the ANSI/ISO-accredited Certified Information Privacy Professional/Europe (CIPP/E) and Certified Information Privacy Management (CIPM) certifications. CIPP/E and CIPM are recommended as the most appropriate for aspiring DPOs, according to Eric Lachaud in “Should the DPO be certified?” in International Data Privacy Law, a journal published by Oxford University Press.

Your class fee includes vouchers for 2 certification exams – CIPM and CIPP/E.

Course Objectives

In this course, the student will learn:

  • Understand how to build and manage privacy regulations and information privacy teams
  • Understand the key European protection laws and regulatory concerns.
  • Understand how to achieve compliance as a US company, concerning EU regulations.

Target Student

US Based IT and InfoSec leaders charged with managing the privacy of personal information that is, or could be, owned by an individual located in the European Union.

Your Instructors

Bob Siegel, President and Founder of Privacy Ref

President and founder of Privacy Ref, Inc., Bob Siegel, started the company in 2012. After his time as Senior Manager of Worldwide Privacy and Compliance at Staples, Inc., Bob applied his experience and expertise to assisting companies implement and maintain strong privacy programs. Bob has worked with many different organizations, dealing with programs of all sizes and regulatory needs.

Always seeking to improve his own understanding of all things privacy, Bob has earned certifications from the International Association of Privacy Professionals. These include certifications in US private and public sector, European, and Canadian privacy laws. Bob has also earned certifications in Information Technology Privacy and Privacy Program Management. Bob Siegel has also been recognized as a Fellow of Information Privacy by the IAPP for his outstanding dedication to the privacy community. He has also served on the IAPP’s Certification Advisory Board for the CIPM program and the IAPP’s Publication Advisory Board. Bob also serves on the IAPP’s teaching faculty leading classes in the areas in which he is certified.

Bob Siegel currently maintains his blog on the company’s website, www.privacyref.com. Bob is also a writer at CSOonline.com where his blog, Operational Privacy, can be found.


All Classes held from 9:00am to 5:00pm EST


January 22-25, 2018
20 Trafalgar Square
4th Floor
Nashua, NH 03063

April 9-12, 2018
Charles River Associates
200 Clarendon Street
Boston, MA 02116
(512) 255-3700

Certification and Exam Vouchers

Includes vouchers for 2 certification exams – CIPM and CIPP/E

Additional Information

Need help figuring out which cyber security solution is optimal for your company?