Stop Fire-Fighting. Start Securing.
Threat & Vulnerability Management: From Reactive Fire-Fighting to Proactive Security Discipline Date · 25.03.2026 It’s hard…
DPO in 2026: Are you already AI-proof?
There is no escaping it: sooner or later every DPO will have AI on their plate.…
Data Governance as part of the DPO toolbox
GDPR compliance depends on one fundamental fact: do you know what data you have, where it…
DPO DAY 25 May 2023 – Closing remarks
After this day, after 5 years of GDPR, the role of the DPO is still a…
DPO in the spotlight: Christa Verstraeten
In this article we want to spotlight a data protection officer based on 10 questions they…
The D in GDPR
When implementing or managing our day-to-day GDPR activities, we often look at the regulation, advice from…
Top 10 CISO Challenges: What to Expect and How to Prepare
In the ever-evolving world of cybersecurity, a CISO’s role is anything but static. The responsibility that…
The Competitive Edge of Privacy by Design in Product Development
Data privacy is becoming increasingly important for businesses in gaining the trust of their customers. Companies…
Every IT environment requires a secure architecture to withstand the cyber threat. How can you build…
5 tips to run GDPR compliant marketing campaigns
The marketeers’ playing field witnesses the birth of a new platform or tool almost every week,…