Resources, services and solutions

Assess your environment and identify potential risks!

Assess your environment and identify potential risks!

The starting point to protect a company from cyber threats is to develop an understanding of possible cybersecurity and privacy risks to company’s systems, assets, data, and capabilities. Therefore, a risk assessment must take place in order to go through everything what can be vulnerable to a security breach – digital and physical assets of the company, interconnections, etc.

Company must be able to answer questions such as: what are the possible cybersecurity and privacy threats? What is the company’s environment which might be at risk? If and how is the company exposed to the risks? What policies and procedures does the company have to manage the risks?

Cyberwatching.eu advises:

Other informational material:

 

Safeguard your company!

Safeguard your company!

Every company must put in place relevant safeguards that allow to fully avoid or at least limit and supress the impact of a likely cybersecurity incident. In order to do so, it is important not only using protective software but also timely updating and repairing the necessary components, training staff, ensuring data security, etc.

 

Cyberwatching.eu advises:

Related events:

 

Spot the breach!

Spot the breach!

In the unfortunate incidence of a cybersecurity and privacy breach, companies must respond immediately in order to minimize the loss. It is only possible if the breach is spotted timely, leaving attackers no time to act around the important data or software. Therefore, continuous monitoring and immediate discovery of any anomalous activity must be enabled.

Other informational material:

 

Deal with the incident!

Deal with the incident!

If, unfortunately, cybersecurity incident occurs, the company must be ready to respond quickly and limit the negative impact of the incident. Thus, all the companies must have a clear action plan prepared for such cases, as well as staff prepared to stop the breach, communicate about it to the relevant stakeholders, contain expansion of the incident, etc.

Cyberwatching.eu advises:

Other informational material:

 

Get back on your feet!

Get back on your feet!

Every company must have a plan that describes how to return to normal operations and limit damage to the company which might continue well after the breach. Such a recovery plan shall foresee the best ways to restore any lost capabilities or impacted services; internal and external communication activities; implementation of the lessons-learned.

Cyberwatching.eu advises:

Other informational material:

News

Pilots for the European Cybersecurity Competence Networks: how can your SME benefit? - Cyberwatching.eu 6th Webinar -

The four pilot projects involved in the development of the European Cybersecurity Competence Network will present their plans and upcoming tools and services for SMEs in the Cyberwatching.eu webinar on the 2nd of April, 10:00 AM CEST

REGISTER NOW!

 

Future Events

Cyber Insurance and its Contribution to Cyber Risk Mitigation - Leiden March 25-29
25/03/2019 to 29/03/2019
Image:

The rise in both the scale and severity of recent cyberattacks demands new thinking about cybersecurity risk and the mitigation and transfer of that risk. Cyber insurance is one potential way to manage risk by transferring damage liability, but the cyber insurance market is immature and the understanding and actuarial knowledge of cyber-risk is currently underdeveloped.

e-SIDES workshop 2019
02/04/2019
Image:

e-SIDES workshop: Towards Value-Centric Big Data: Connect People, Processes and Technology

BRUSSELS

2 April 2019

10am to 4pm

 

e-SIDES is a research project funded by European Commission H2020 Programme that deals with the ethical, legal, social and economic implications of privacy-preserving technologies in different big data context.