<img alt="" src="https://secure.pass8heal.com/222178.png" style="display:none;">
Good Enough IT Risk Management

Jakob Holm Hansen


Seneste indlæg

Choosing the right business continuity scenarios for your BCP

[fa icon="calendar'] Wednesday, 08 June 2022 / by Jakob Holm Hansen under business continuity strategy, Business Continuity Planning, Information Security Management, business continuity scenario, ISMS, BCP, disaster recovery

[fa icon="comment"] 0 comments

By Jakob Holm Hansen, Neupart


Our most recent blog post dealt with The three golden rules of a business continuity plan. This time, we continue in the world of business continuity planning and take a closer look at scenarios and strategies.

More [fa icon="long-arrow-right"]

The three golden rules of a business continuity plan

[fa icon="calendar'] Monday, 30 May 2022 / by Jakob Holm Hansen under Business Continuity Planning, Information Security Management, IT risk assessment, information security policies, SecureAware BCP, ISMS, BCP

[fa icon="comment"] 0 comments

By Jakob Holm Hansen, Neupart

"How long should a business continuity plan be?" This is a question we often hear from our customers. My answer usually is: "As short as possible!" The truth is that the perfect business continuity plan (if such a thing exists) should be three - sometimes contradictory - things at once:

More [fa icon="long-arrow-right"]

How to Handle a GDPR Breach

[fa icon="calendar'] Sunday, 08 May 2022 / by Jakob Holm Hansen under GDPR

[fa icon="comment"] 0 comments

Has the organization done all it can to protect data subjects before, during, and after a security incident? This is essentially the question that both private and public organizations must ask themselves when defining accountability and imposing sanctions in the aftermath of
a personal data security breach

 

Neupart's new white paper, GDPR - Handling Personal Data Security Breaches in Three Phases, considers the formal requirements for handling a personal data security breach in accordance with GDPR and sets out guidelines for the preparation and anchoring of appropriate contingency measures.

More [fa icon="long-arrow-right"]

Secure ISMS Version 6.0

[fa icon="calendar'] Wednesday, 26 February 2020 / by Jakob Holm Hansen under information security, ISO 27001, information security policies

[fa icon="comment"] 0 comments

Learn about some of the news in Secure ISMS version 6.0 

More [fa icon="long-arrow-right"]

Risk assessments must align with business goals

[fa icon="calendar'] Monday, 16 December 2019 / by Jakob Holm Hansen under information security, Risk assessments, risk treatment

[fa icon="comment"] 0 comments

It is not just a huge help for general management when company risk assessments are based around concrete business goals. Business-based risk assessments also help information security managers to prioritise what scarce resources they have.

More [fa icon="long-arrow-right"]

Information security requires management support – here's how to get it

[fa icon="calendar'] Friday, 28 June 2019 / by Jakob Holm Hansen under information security, annual plan, compliance programme, management support

[fa icon="comment"] 0 comments

It is gradually becoming more and more necessary to actively secure management support for any new business initiatives – not least when it comes to information security. The support of decision makers is absolutely essential for the successful operation and development of a compliance programme. But how can we go about getting this support? Neupart CEO cuts through the rhetoric and offers up five pieces of advice to those responsible for information security.

More [fa icon="long-arrow-right"]

New compliance planning tool gives information security managers an automatic plan

[fa icon="calendar'] Wednesday, 01 May 2019 / by Jakob Holm Hansen under Information Security Management, annual plan, compliance programme

[fa icon="comment"] 0 comments

There used to be many unknown factors for information security managers to take into account when implementing and maintaining a security standard. That is no longer the case. A new planning tool from Neupart, neupartOne, creates a well-arranged plan for the compliance work and automatically combines all the tasks in a single annual plan.

More [fa icon="long-arrow-right"]

Five great tips for security officers with sole responsibility for information security

[fa icon="calendar'] Tuesday, 19 March 2019 / by Jakob Holm Hansen under information security, continuous compliance, annual plan

[fa icon="comment"] 0 comments

All alone in the world. This is a feeling that many security officers with sole responsibility for information security can recognise as they are faced with more and more requirements for their compliance programme, without any extra resources to help them carry out their tasks. But never fear, for the managing director of Neupart is here to the rescue with five great tips to increase efficiency and help management to better understand information security.

More [fa icon="long-arrow-right"]

ISMS: "The value you can measure is the value you deliver"

[fa icon="calendar'] Monday, 12 November 2018 / by Jakob Holm Hansen under ISO 27001, ISMS, annual information security plan

[fa icon="comment"] 0 comments

ISMS performance monitoring allows security officers to document specific business value while also enhancing the level of security within the organisation. A Neupart white paper provides inspiration on how to select, define and monitor effects in an ISMS solution.

More [fa icon="long-arrow-right"]

Information Security: How to get the most out of limited resources

[fa icon="calendar'] Thursday, 20 September 2018 / by Jakob Holm Hansen under GDPR, information security annual cycle, continuous compliance

[fa icon="comment"] 0 comments

With an annual cycle for information security, you can ensure that the right security processes are in place, and that the company’s internal resources have enough time to solve the many other tasks that require attention.
More [fa icon="long-arrow-right"]

Good enough IT risk management

The Neupart blog offers advice and knowledge of effective information security management, security strategies, risk management, compliance with information security standards and other requirements, business continuity planning, ISO2700x, EU Data Protection Regulation, PCI DSS, etc.

Popular Posts