A blog about GRC (Governance, Risk Management, and Compliance)

Jakob Holm Hansen


Seneste indlæg

Data Protection Officers - Who Needs Them?

[fa icon="calendar'] Monday, 13 March 2017 / by Jakob Holm Hansen under compliance, eu general data protection regulation, eu gdpr, DPO

[fa icon="comment"] 0 comments

Data Protection Officers. It’s a topic that seems to be on everyone’s mind now that we actively preparing for the implementation of the GDPR, but who needs them?

Anyone working with information security management is by this stage well aware of the upcoming EU General Data Protection Regulation. Come to think of it, even those not working with information security management have probably heard of it too, considering the amount of coverage it has gotten. It’s no wonder given that the new regulation will be the biggest data protection regulation to date. Even though it is being set by the European Union, it will affect companies worldwide. This is because together, the 28 EU member states not only represent the world’s largest economy but are the top trading partner for 80 countries. Effectively, this means that any country dealing with personal data from citizens of the European Union will need to comply with the GDPR.

 

Download our 7-step guide to implenting the EU GDPR

 

Soon after the news about the GDPR broke, another abbreviation started popping up everywhere: DPO. Of course, a Data Protection Officer is not a new role per se, but with the sudden focus on the legality of data protection, it only makes sense that we start focusing more on their role. The International Association of Privacy Professionals originally estimated that the new data protection regulation would require 28,000 DPOs in Europe and the United States. They have now increased that number up to 75,000 new DPO positions, worldwide. 75,000 is a lot of positions to fill, which leads to the question: who needs a Data Protection Officer?

More [fa icon="long-arrow-right"]

Hacking online meetings

[fa icon="calendar'] Monday, 09 November 2015 / by Jakob Holm Hansen under Information risk management, Risk assessments, Risk Management

[fa icon="comment"] 0 comments

By Gaffri Johnson, Neupart

Why risks related to information sharing via calendars and online meeting tools should be included in your annual it risk assessment.

More [fa icon="long-arrow-right"]

Updating Information Security Policies: Adapting to ISO 27002 2013

[fa icon="calendar'] Thursday, 05 June 2014 / by Jakob Holm Hansen

[fa icon="comment"] 0 comments

I have worked with information security for several years (despite my young age) and I have seen numerous different policies, rules, procedures, and other types of security documentation. What works best is to have a clear, well-defined breakdown between these, for example:

More [fa icon="long-arrow-right"]

New Webinar series on Information Security Management best practice

[fa icon="calendar'] Wednesday, 13 November 2013 / by Jakob Holm Hansen

[fa icon="comment"] 0 comments

Join us when Founder and CEO Lars Neupart gives a guided tour through ISO 27001, related standards and best practices for information security management. Click below and sign up for one or more half-hour webinars:

More [fa icon="long-arrow-right"]

GRC blog

The NorthGRC blog offers advice and knowledge of effective information security management, security strategies, risk management, compliance with information security standards and other requirements, business continuity planning, ISO2700x, EU Data Protection Regulation, PCI DSS, etc.

Popular Posts