Resources, services and solutions

Assess your environment and identify potential risks!

Assess your environment and identify potential risks!

The starting point to protect a company from cyber threats is to develop an understanding of possible cybersecurity and privacy risks to company’s systems, assets, data, and capabilities. Therefore, a risk assessment must take place in order to go through everything what can be vulnerable to a security breach – digital and physical assets of the company, interconnections, etc.

Company must be able to answer questions such as: what are the possible cybersecurity and privacy threats? What is the company’s environment which might be at risk? If and how is the company exposed to the risks? What policies and procedures does the company have to manage the risks?

Cyberwatching.eu advises:

Other informational material:

 

Safeguard your company!

Safeguard your company!

Every company must put in place relevant safeguards that allow to fully avoid or at least limit and supress the impact of a likely cybersecurity incident. In order to do so, it is important not only using protective software but also timely updating and repairing the necessary components, training staff, ensuring data security, etc.

 

Cyberwatching.eu advises:

Related events:

 

Spot the breach!

Spot the breach!

In the unfortunate incidence of a cybersecurity and privacy breach, companies must respond immediately in order to minimize the loss. It is only possible if the breach is spotted timely, leaving attackers no time to act around the important data or software. Therefore, continuous monitoring and immediate discovery of any anomalous activity must be enabled.

Other informational material:

 

Deal with the incident!

Deal with the incident!

If, unfortunately, cybersecurity incident occurs, the company must be ready to respond quickly and limit the negative impact of the incident. Thus, all the companies must have a clear action plan prepared for such cases, as well as staff prepared to stop the breach, communicate about it to the relevant stakeholders, contain expansion of the incident, etc.

Cyberwatching.eu advises:

Other informational material:

 

Get back on your feet!

Get back on your feet!

Every company must have a plan that describes how to return to normal operations and limit damage to the company which might continue well after the breach. Such a recovery plan shall foresee the best ways to restore any lost capabilities or impacted services; internal and external communication activities; implementation of the lessons-learned.

Cyberwatching.eu advises:

Other informational material:

Events

27/11/2018 to 28/11/2018
Cyber Investor Days

On 27th and 28th November in Berlin, Germany, ECSO is organizing in collaboration with Secunet and TeleTrusT, the Cyber Investor Days.

The most promising European cyber security start-ups and SMEs will have an opportunity to pitch their solution and meet the influential German and international investors during strategic business matchmaking sessions.

CYBER INVESTOR DAYS will be officially opened by Andreas Koenen, Director General of the Cyber and Information Security Directorate at the German Ministry of Interior, and Clemens Kabel, Investment Director at IBB Investment.

13/12/2018 to 14/12/2018
Call for Papers: Halfway Through the Digital Single Market Strategy: “Bedrock of Trust” or illusion?

Call for Papers

The Law Faculty of the University of Lille cordially invites junior and senior researchers to participate in a conference held as part of the Horizon 2020 project “TRUESSEC.eu”, on the 13th and 14th December 2018. The conference will be hosted by the Law Faculty.