Building an effective ISMS - Part 3: Risk Assessment Previously In our last article , we identified and documented primary and support assets critical to achieving ISO 27001 certification. We explored how to map out essential components and understand t...
Building an effective ISMS - Part 2: Asset identification Previously In our previous article , we explored how to lay a solid foundation for ISO 27001 certification, including strategizing and preparing essential documents . These steps are vital for creatin...
Building an effective ISMS - Part 1: Setting the stage In the digital age, information is a critical asset for any company. Protecting this data is crucial, and implementing an ISMS and getting it certified (e.g. ISO27001) is a clear sign of an organizati...
The Evolution of GRC in the Digital Age The Evolution of GRC in the Digital Age In today's dynamic business landscape, the convergence of technology and governance has led to a profound transformation in Governance, Risk, and Compliance (GR...
Understanding the Fundamentals of GRC Management Understanding the Fundamentals of GRC Management In today's rapidly evolving business landscape, organisations encounter an array of challenges, spanning from regulatory compliance to managing operati...
Gemeenten helpen om te voldoen aan NIS2 In het licht van snel evoluerende digitale landschappen en strikte regeldruk staan Europese gemeenten voor de enorme taak om robuuste, efficiënte en allesomvattende GRC-raamwerken (Governance, Risk Ma...
CORAL - Fit4CSA Start your Fit4CSA self-assessment now About the Project CORAL, which stands for cybersecurity Certification based On Risk evALuation and treatment , is a European Union-funded project under CEF Telec...
Self-assessment of security ROI for SMBs As security professionals we often get the question: "What is the return on investment of security (and compliance)?". This is not an exact science, and of course fully depends on the value of your as...
What you need to know about the EU's Digital Operational Resilience Act (DORA) What is DORA The Digital Operational Resilience Act (DORA) , is an initiative introduced by the European Parliament and the Council, set to become effective by 17 January 2025 . This regulation was co...
Efficiëntie in compliance management Introductie Compliance management is van vitaal belang voor organisaties die willen voldoen aan de regelgeving en normen die van toepassing zijn op hun activiteiten. Het beheren van al deze normen en ...
The Importance of Investing in an Information Security Management System (ISMS) Introduction As the world becomes more and more reliant on technology, the risks of cybersecurity threats and vulnerabilities are on the rise. From large corporations to small businesses and even indi...
Building an effective security program Building an effective security program can be a daunting challenge for any size company. This is because you don't only need to think of technical measures, but also integrate this into your organizat...