Get acquainted with a methodology to proactively develop a security strategy, tailored to your organization.
In this months newsletter: A guest article by Brook Schoenfield, Webinar on 10 September: Up your game with the Threat Modeling Playbook ,A tip on “DREAD…
How can we create a sound security strategy that increases our security maturity and expenditure to the optimal level, while taking into account our business…
Data exchange with the USA was allowed, because the USA is considered “adequate”, but not anymore…
Black hat hackers have become increasingly professional in recent years
Board members are not cybersecurity experts, so how do you keep track of the cybersecurity posture of your organization, without going into the bits and…
Many of these questions reflect back on the principles from the ECODA guidebook: having a solid risk management program, access to security expertise, mitigation of…
Creating a culture of innovation and awareness, in which employees can challenge the status quo while being adequately aware of potential risks.