ENISA AI Cybersecurity Conference took place on 7th June, and here are the key highlights: AI is a double-edged sword when it comes to Cybersecurity as it enables better and more advanced prevention against cyberattacks but at the same time...
As a data protection professional, you will often find yourself being part of large contractual negotiations, where you will be responsible for data processing agreement. Therefore, please find below a few tips on how to prepare for a (re-) negotiation...
As cybersecurity risks increase and new data protection requirements surface, navigating the privacy and security landscape has become ever more onerous and demanding.Even in organisations with well-established and mature enterprise risk management programs, keeping your risk picture updated and actually...
Bringing your privacy and security program to life involve turning the principles and activities outlined in the framework into concrete actions and processes that can be implemented in practice within your organisation. This typically involves defining clear roles and responsibilities,...
SECURING THE RIGHT VENDORS IN THE cybersecurity AND DATA PRIVACY DOMAINS Digitalization forcefully accelerates the adoption of platforms and devices that allow sensitive data to be shared with third parties, such as cloud service providers, data aggregators, application programming interfaces...
ISO/IEC 27001 is widely known as the de facto information security standard that specifies the requirements for establishing, implementing, maintaining, and continually improving an information security management system. The first version of ISO/IEC 27001 was published in 2005, which evolved...
Stay informed about our services, offerings and latest developments in data protection, cyber security and AI, through our White Label Consultancy newsletter. Gain early access to our insights, events, and many more.