How to react after a hack successfully exploited a server, and possibly breached access to Personally Identifiable Data, in the wake of the GDPR.
This is the presentation-ready version, directly usable for presenting. The other version of this presentation includes the presenter notes.