Information security in supplier relationships
The IT contract is no longer just a commercial contract. Today, its primary purpose is to support the IT department's KPIs on availability – as close to 100% as possible. Therefore, it is important that you are aware of the requirements that the extensive cybersecurity regulation, such as NIS 2 implementation legislation and DORA, impose on the terms of an IT contract. The […]
Are US tech giants the future? Is your cloud exit plan ready?
Do you have a Cloud Exit Plan? With all the chaos following Trump's re-election as president and the noyb organization (none of your business) pointing out that it could soon become a very big problem to use the big US tech giants, especially in the context of GDPR, it is extra important that you have a cloud exit plan for your […]
NIS 2: Note – Who is covered in the water sector
As you know, NIS 2 applies to significant and important entities in various critical sectors, including the water sector. To be even more precise, it is the specific activities actually carried out by the entity that determine whether it is covered or not. One might even speak of a reality check when determining whether […]
Cyber Security Strategy – What is it? Why should I have one? How do I get started?
In connection with the new regulations such as NIS 2, DORA etc. personal responsibility has been dictated for management through responsibility for cyber security. Listen Jacob Naur briefly talk about what a cyber security strategy is, why you need one, and how to get started. You are of course very welcome to contact Jacob or a [...]