Good Enough IT Risk Management

ISMS: "The value you can measure is the value you deliver"

Information Security: How to get the most out of limited resources

GDPR: What will happen after 25 May 2018?

GDPR: If you are like most people, you prepare far more records of processing activities than you should

How to Handle a Personal Data Security Breach

GDPR: You Passed the Test – Now What?

To Assess, Or Not To Assess

GDPR: Make It Easy to Do It Right

Dear IT Manager: GDPR is not your responsibility – but it is your task

GDPR Compliance: Don’t Start from Scratch – Just Bridge the Gap

Why You Should Be Carrying Out a Risk Assessment

GDPR Compliance: You do not need to carry out an exhaustive dataflow analysis

The EU GDPR: Three tips that will save you time, money, and worrying.

Continuous Compliance with the GDPR

Data Protection Officers - Who Needs Them?

Personal Data Protection - How Hard Can It Be?

How to comply with the EU GDPR

Risk Assessments - What are they for?

EU Data Protection Regulation - How Hard Can It Be?

Hacking online meetings

Risk assessment is a process - 3 reasons to do it again (and again)

Can you make IT security sexy? - a Guide to Awareness Campaigns

Why in the world should managers be interested in information security?

Choosing the right scenarios for your business continuity plans

The three golden rules of business continuity planning

Tips to help you building your information security policy - New vs. old ISO 27002

How to measure ISO 27001 ISMS efficiency with KPIs

Has ‘Plan-Do-Check-Act´disappeared in the new ISO 27001?

Do you need to explain what is ISO 27001?

New Webinar series on Information Security Management best practice

The new ISO 27001 is out! How to develop a Statement of Applicability

How to assess your business risks when going cloud

How does the ISO 27001:2013 affect your risk management process?

IT Risk Management increases your IT outsourcing success

Six questions about the ISO 27001 revision (with answers)

Three ways the ISO 27001 revision will affect your company

4 responsible shortcuts to good enough risk assessments

Good enough IT risk management

The Neupart blog offers advice and knowledge of effective information security management, security strategies, risk management, compliance with information security standards and other requirements, business continuity planning, ISO2700x, EU Data Protection Regulation, PCI DSS, etc.

Popular Posts