Introductory Guide: Key Issues in Cybersecurity and GDPR Compliancy

April 10, 2019

GDPR demands the safeguarding of data subjects’ rights and interests. It allows for organizations to employ a risk based approach to personal data protection. This means that organizational risks and interests may be weighed against a data subject’s rights and interests. Subsequently, both organizational risks, as well as data subject risks need to be taken into account when assessing whether the processing and protection of personal information is performed adequately. Due to the contextual nature of privacy, different situations will lead to risks and interests being weighed differently, depending on each individual situation. Notable risks and threats are found outside, as well as within the organization.

Spotlight

Network Security Group

Network Security Group melds technology expertise and world class customer care together to bring our customers and partners best of breed security and complementary technologies to protect and manage their environments more efficiently than ever before.

OTHER WHITEPAPERS
news image

What Is a Value Chain for Security

whitePaper | November 15, 2019

Cisco has architected and deploys a capability that continually assesses, monitors, and improves the security of our value chain throughout the entire lifecycle of our solutions.

Read More
news image

Cybersecurity: Experience and best practices during COVID-19 pandemic

whitePaper | July 6, 2020

With this white paper focused on the emerging cyber threat that we world is facing during the COVID-19 crisis, NETIA wish to share his experience, his initiatives and his knowledge on those topics.

Read More
news image

The Importance of Cybersecurity Threat Detection for Utilities

whitePaper | November 25, 2019

Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive approach to ensuring cyber protection is essential and should include cybersecurity threat detection as a standard element. But not all such cybersecurity solutions are created equal.

Read More
news image

Security Protocol and Data Model (SPDM) Architecture White Paper

whitePaper | September 26, 2022

This white paper presents an overview of the SPDM architecture, its goals, and a high-level summary of its use within a larger solution. The intended target audience for this white paper includes readers interested in understanding the use of SPDM to facilitate security of the communications among components of platform management subsystems.

Read More
news image

The ‘Zero Trust’ Model in Cybersecurity: Towards understanding and deployment

whitePaper | August 24, 2022

In the last couple of years, “zero trust” has gained significant traction in the cybersecurity realm as a means to protect networks and increase security across organizations. In part, the growing popularity of this security model can be attributed to the shift to hybrid working practices that call for a more secure work environment whether on- or off-premises.

Read More
news image

Cybersecurity Considerations for Distributed Energy Resources on the U.S. Electric Grid

whitePaper | October 26, 2022

To address the impacts of climate change, the U.S. electric grid will be undergoing significant changes by integrating clean energy resources such as solar and wind. These efforts will be accelerated with the recent passage of the Infrastructure Investment and Jobs Act1 and the Inflation Reduction Act.

Read More

Spotlight

Network Security Group

Network Security Group melds technology expertise and world class customer care together to bring our customers and partners best of breed security and complementary technologies to protect and manage their environments more efficiently than ever before.

Events