GDPR Consultancy
CyberDefence can help you understand and implement the EU regulation in your organisation.
We will plan your project for implementation, conduct data privacy impact assessment(DPIA), design and integration of security controls and then will provide you blank policies, procedures, guidelines and forms that must be used in future.
You will use your own human resources for the necessary tasks related to the implementation of the requirements.
GDPR Implementation
CyberDefence will help you and will cover all the tasks related to the implementation of EU regulation. Services that can help you build on your existing structures and controls to improve your personal data protection approach and controls.
We will cover the entire process from the beginning - planning of the project to the end - implementation of formal documentation and train your staff for maintenance.
CyberDefence can help you with the following challenges:
-
Define processes to react to data breaches;
Implement accountability mechanisms;
Define privacy controls and privacy policies;
Use data protection tools in line with privacy policies;
Educate and train your staff related to GDPR;
Mitigate data breaches;
Your responsibility will be to assist us during the planning process and then to be available for collaboration process during the designing and integration of privacy controls and countermeasures.
GDPR Compliance Assessment
Services that can help you understand where you are positioned with respect to GDPR requirements.
CyberDefence can help with understanding where your data assets are, and what are the controls in place to protect those assets.
We can help you conduct data asset inventory/mapping, data protection assessments, Data Privacy Impact Assessment(DPIA), gap analyses, risk assessment and overall evaluations of the data protection maturity within the organisation.
Enhancing Data Governance
Services that can help you build and customise your own governance approach to data protection.
CyberDefence can help you design your own program to improve data protection maturity within the organisation. Specific points in this design include:
-
Defining specific privacy and accountability policies;
Design and intergration of robust and sound metrics to compare yourself against competitors;
Selecting and training specific data protection roles within your organisation;
Aligning privacy strategies to business strategies in order to bridge the compliance gap and protect personal data.

"Adversaries have more tools at their disposal than ever before. They also have a keen sense of when to use each one for maximum effect. The explosive growth of mobile endpoints and online traffic works in their favor. They have more space in which to operate and more choices of targets and approaches."
Cisco 2017 Annual Cybersecrity reportInformation Security is important part of your business. When was the last time when you evaluated the security in your organization?
Insider threats pose significant risks to your organization. According to the Verizon 2016 Data Breach Investigations Report, the actions of insiders are among the most difficult to detect and the majority of these incidents are taking months or longer to discover. The key to defending against this class of threats is to understand the who, the why, and the when. Let's look at those critical elements and what you can do to protect yourself.
Andrew Costis(LogRhythm)The cybersecurity landscape is changing rapidly, making current and actionable guidance on the latest trends more important than ever.
CYBERSECURITY TRENDS REPORT (ICS)2