Stefan Sokolowski

Implementing ISO 27701 – Privacy for ISO 27001

When the GDPR came into force on the 25th May 2018, a number of Articles referred to the creation of certification schemes that could be approved by Authorities, to make it easier for data subjects to understand whether an organisation had appropriate privacy controls. Implementing ISO 27701 looks like the easiest route currently to this …

Implementing ISO 27701 – Privacy for ISO 27001 Read More »

Third Party Assurance – your weakest link

Organisations spend considerable sums of money to protect themselves against the cyber risks that they see in front of them. Unfortunately, you can’t manage what you can’t see. This has been the problem with third party assurance for a significant length of time. Historically, data was fairly immobile with mainframes and the lack of an …

Third Party Assurance – your weakest link Read More »

Effective Communications during a Cyber Breach

We can generally gauge the level of preparation and understanding a company has about their own cyber security by the way they respond externally to a cyber incident. There have been some notable examples over the years where cyber security professionals have had to put palm to face on some of the media responses placed …

Effective Communications during a Cyber Breach Read More »

What every Board member needs to know about Cyber

Discussions at Board level on Cyber Security are generally low on reality and high on rhetoric. This is due to the meeting of two very different worlds. Between a CISO who appears to be claiming Armageddon on a daily basis unless the Board fund all requirements, and a Board who don’t have enough knowledge to …

What every Board member needs to know about Cyber Read More »

Data breaches at Access Aggregators

As cybercrime adapts to general business circumstances, a likely trend is the targeting of service providers who look after access control for other businesses. As small businesses look for support in moving to the cloud, many cloud solution providers are springing up to act as middle-men between the business and the cloud providers like AWS …

Data breaches at Access Aggregators Read More »