This is a content teaser for the upcoming B.I.G. Workshop. Michael Abtar from IG Smart is one of our experts. The B.I.G Workshop, London’s first-of-its-kind, interactive tech workshop for tech startups looking to elevate their brand and improve the industry.

Michael is a unique data protection and cyber security consultant with a law background. His 10 years of experience working in the information law and governance arena has led him to manage all levels of programmes and projects from sub-regional to international. He is also a regular keynote speaker and moderator. The bridge between what companies are trying to achieve and what the law allows has large disparities in many cases but with Michael’s comprehensive knowledge of both law and cybersecurity, he is able to help companies lock down their data.


Tech companies (like all companies) can ensure they implement effective data protection within the core of their business by embedding data privacy, security and quality into all systems, processes and technologies by design and by default. Although, doing so can be easier said than done, depending on the nature and complexity of what a tech company does with its data.

For example, multi-national tech companies like Microsoft, Google and Facebook that provide a multitude of solutions and products (both new and legacy) across a wide range of data protection jurisdictions, will almost certainly find it more difficult to implement effective organisation wide data protection measures, compared to a small tech company that sells a single solution within a single jurisdiction would.

The issues surrounding large volumes of precious data

One of the biggest challenges tech companies face is often the sheer complexity of what they do with large volumes of data (data which can often be unstructured and therefore sometimes more difficult to manage). Increasing the risk of technology companies falling foul of data protection laws, notably the EU’s new General Data Protection Regulation (GDPR), and falling victim to increasingly malicious cybersecurity threats…

[click here to read more about the B.I.G Workshop]

0