Information Protection Processes and Procedures

Home » Marketplace » Information Protection Processes and Procedures

Information Notice Tool

The Information Notice Tool is mainly focused only on Art. 13 and Art. 14 of the GDPR which enlist the elements that must be included in an Information Notice to data subjects.

The tool will help you with a very practical check-list for the components required in an Information Notice under the GDPR.

Cybersecurity Awareness Solution for Local Public Administrations

CS-AWARE is a cybersecurity situational awareness software solution for Local Public Administrations. It was designed to detect, classify and visualize cybersecurity incidents in real time, supporting the prevention or mitigation of cyber-attacks. It addresses small, medium or big size Local Public Administrations and it can be taylored to any local software set-up, any European language and any type of LPA internal workflow and specifics.

The main features are:

1) Versatile connectivity: it is capable to connect to any type of internal or external data source

IoTsTrust

In this wild IoT market, estimating cybersecurity risks, selecting the right standard to comply with and getting certified during the manufacturing process is an extremely complex task. Security Requirements, Security Controls and Security Assurance Activities must be considered by all the project stakeholders including business-lines and risk-owners.

GuardYoo

GuardYoo is an easy-to-use, agentless, yet powerful solution, that enables organizations of all sizes to proactively discover malware and persistent threats (active or dormant), that have breached existing defenses including online and real-time protection measures.

OpAudit™

OpAudit™ is a brand new kind of compliance tracking solution which gathers & manages all evidence of compliance in a single system to successfully track answers & evidence from contributors (Attestations), technical data from devices (Audit) and questionnaires from staff & supply chain (Assessments) for external and internal policies and audits.

OpView™

OpView™ is one of the most flexible security monitoring systems on the market which leverages a completely new database architecture to collect, correlate and report on all data types so you can successfully monitor security (SIEM), vulnerability, configuration & availability (SOC), performance, asset & flow (NOC) all in a single configurable system.

GDPR Temperature Tool

The GDPR Temperature Tool helps European SMEs understand just how at risk they are to sanctions or fines.

By answering a set of questions on data processing activities, the tool provides an indication, or temperature, of a company’s risk to sanctions. The higher the temperature, the higher the risk. In addition, a free a customised set of practical and actionable recommendations is provided.

H-PREDICTIVE PLATFORM

H-Predictive Platform (PAR) merges digital twins and adversary simulation to anticipate attacks and manage risk in an ICT infrastructure, thru a life long continuous process of assessment and remediation

H-Time Machine

H-Time Machine (Forensics module) supports the discovery of successful, undetected attack against a previous version of the infrastructure, and forensics investigation in case of data breach

H-AI Real Time module

H-AI Real Time module (CAP), using predictive cyber attacks database generated by H-PAR, continuously monitor the infrastructure to predict, attribute and stop attacks in Real Time. H.CAP dramatically reduces the false positive, detects 0-Day exploitation and finally neutralize it

Pages

Future Events

The third Annual Fraud & Financial Crime Europe will focus on analysing the risks to determine the solutions in combating Fraud and Financial Crime.

01/09/2020 to 02/09/2020

Information security and privacy have already been established as some of the most crucial aspects of technology especially in a world that is migrating to digital applications by the day. This has inevitably led to the emergence of technologies that support the safety and dependability of the ever-increasing sensitive data handled by these applications. Additionally, besides these technologies which target security by their design, there are other technologies, such as machine learning, which could potentially be applied to security in innovative schemes. 

17/09/2020 to 18/09/2020