Introductory Guide: Key Issues in Cybersecurity and GDPR Compliancy

April 10, 2019

GDPR demands the safeguarding of data subjects’ rights and interests. It allows for organizations to employ a risk based approach to personal data protection. This means that organizational risks and interests may be weighed against a data subject’s rights and interests. Subsequently, both organizational risks, as well as data subject risks need to be taken into account when assessing whether the processing and protection of personal information is performed adequately. Due to the contextual nature of privacy, different situations will lead to risks and interests being weighed differently, depending on each individual situation. Notable risks and threats are found outside, as well as within the organization.

Spotlight

NEC Networks & System Integration Corporation

"The NEC Networks & Systems Integration Group is fully committed to being the best business partner for its customers by increasing customer value, helping create a more convenient and prosperous society, and creating peace of mind through the establishment of reliable networks, as stated in our Group philosophy."

OTHER WHITEPAPERS
news image

INDUSTRIAL CYBER RISK MANAGEMENT

whitePaper | May 21, 2021

Critical infrastructure owners and operators have managed industrial risk for hundreds of years. This risk is usually measured in impact to health, safety, and reliability. As these industrial systems become increasingly digitized, so does the risk. What were once seen as isolated, manual processes have become reliant on communication networks and digital devices.

Read More
news image

Sharkgate Whitepaper

whitePaper | December 11, 2019

SharkGate specializes in protecting websites and has geared up to build the next-generation of website cyber protection: SharkGate is creating the World’s first distributed ledger powered Cyber Security solution designed exclusively to protect websites against hackers. SharkGate is taking a new approach that will change website security as the industry knows it and make the next-generation of cyber protection available to all websites worldwide.

Read More
news image

Cloud-native security practicesin IBM Cloud

whitePaper | December 15, 2019

IBM Cloud™ is IBM’s high-performing public cloud platform, with data centers around the world that deliver cloud computing options from infrastructure as a service (IaaS), platform as a service (PaaS) to software as a service (SaaS). Security is a fundamental design principle for our cloud platform with market-leading security capabilities enabled for regulatory workloads.

Read More
news image

Cybersecurity: Experience and best practices during COVID-19 pandemic

whitePaper | July 6, 2020

With this white paper focused on the emerging cyber threat that we world is facing during the COVID-19 crisis, NETIA wish to share his experience, his initiatives and his knowledge on those topics.

Read More
news image

Scenarios for the Future of Cybercrime - White Paper for Decision Makers

whitePaper | January 28, 2020

Project 2020 is an initiative of the International Cyber Security Protection Alliance (ICSPA). Its aim is to anticipate the future of cybercrime, enabling governments, businesses and citizens to prepare themselves for the challenges and opportunities of the coming decade. It comprises a range of activities, including common threat reporting, scenario exercises, policy guidance and capacity building.

Read More
news image

Ransomware: How to prevent, predict, detect & respond

whitePaper | January 9, 2020

The malicious programs known as ransomware have attracted a significant amount of coverage in the mainstream media over the last few years, as major companies and organizations announced that their operations had been affected by the threat. Examples of affected businesses include hospitals, universities and major international corporations [2, 3]. Despite the alarming nature of the threat, the way ransomware gains entry onto a user’s device is actually no different from the methods used by other threats. Ransomware is most commonly spread by two methods.

Read More

Spotlight

NEC Networks & System Integration Corporation

"The NEC Networks & Systems Integration Group is fully committed to being the best business partner for its customers by increasing customer value, helping create a more convenient and prosperous society, and creating peace of mind through the establishment of reliable networks, as stated in our Group philosophy."

Events