{"id":297,"date":"2017-02-10T23:07:00","date_gmt":"2017-02-10T22:07:00","guid":{"rendered":"https:\/\/hjinterim.wordpress.com\/?p=297"},"modified":"2017-02-10T23:07:00","modified_gmt":"2017-02-10T22:07:00","slug":"our-gdpr-solution-the-smart-way","status":"publish","type":"post","link":"https:\/\/hjinterim.tech\/index.php\/2017\/02\/10\/our-gdpr-solution-the-smart-way\/","title":{"rendered":"GDPR Solution, The Smart Way&#8230;"},"content":{"rendered":"<div id=\"header_layer\">\n<div id=\"id1\" class=\"style_SkipStroke shape-with-text\">\n<div class=\"text-content style_External_363_91 vertical-align-middle-middlebox\">\n<div class=\"style vertical-align-middle-innerbox\">\n<h1 class=\"paragraph_style\" style=\"text-align:center;\"><strong><a class=\"class1\" title=\"http:\/\/proteuscyber.com\/#ProteusGDPReady\" href=\"http:\/\/hj-interim.com\/GDPReady.html\" target=\"_blank\" rel=\"noopener\">GDPReady\u2122<\/a><\/strong><\/h1>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"tinyText style_SkipStroke_1\"><\/div>\n<\/div>\n<div id=\"body_layer\">\n<div id=\"id2\" class=\"style_SkipStroke_2 shape-with-text\">\n<div class=\"text-content style_External_902_92\">\n<div class=\"style_1\">\n<h2 class=\"paragraph_style_1\"><strong><span class=\"style_2\"><img decoding=\"async\" class=\"alignnone  wp-image-408\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/02\/download.png\" alt=\"download\" width=\"198\" height=\"85\" srcset=\"https:\/\/hjinterim.tech\/wp-content\/uploads\/2017\/02\/download.png 343w, https:\/\/hjinterim.tech\/wp-content\/uploads\/2017\/02\/download-300x129.png 300w\" sizes=\"(max-width: 198px) 100vw, 198px\" \/>\u00a0CYBER SECURITY IS A VERY REAL BUSINESS RISK, NOT JUST A TECHNOLOGY PROBLEM\u2019<br \/>\n<\/span><\/strong><\/h2>\n<h2 class=\"paragraph_style_2\"><strong>UNDER GDPR, BREACH COSTS WILL SOAR<\/strong><\/h2>\n<h1 class=\"paragraph_style_2\" style=\"text-align:center;\"><strong>The <a href=\"http:\/\/hj-interim.com\/GDPReady.html\" target=\"_blank\" rel=\"noopener\">GDPReady\u2122<\/a> <\/strong><\/h1>\n<h1 class=\"paragraph_style_2\" style=\"text-align:center;\"><strong>is available now<\/strong><\/h1>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"tinyText style_SkipStroke_1\"><\/div>\n<div class=\"tinyText style_SkipStroke_1\">\n<header>\n<h2>General Data Protection Regulation<\/h2>\n<\/header>\n<div class=\"entry-content content\">\n<div id=\"x-section-1\" class=\"x-section  center-text \">\n<div class=\"x-container   max width\">\n<div class=\"x-column x-sm x-1-1\">\n<h3 class=\"h-custom-headline man\">COMPLIANCY<\/h3>\n<hr class=\"x-hr\" \/>\n<div class=\"x-text none\">\n<p class=\"man\">There will be new requirements on where data is processed<br \/>\nthe General Data Protection Regulation (GDPR) is set to replace the Data Protection Directive 95\/46\/ec REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing the Directive 95\/46\/EC (General Data Protection Regulation)<\/p>\n<p class=\"man\">We have three stakeholders here :<br \/>\n\u2022 The controller \u2013 determines the purposes for which and what means by which personal data is being processed<br \/>\n\u2022 The Processor- an entity that processes personal data on behalf of the controller<br \/>\n\u2022 Processing- any operation that is performed on personal data.<\/p>\n<p class=\"man\">\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"x-section-2\" class=\"x-section  \">\n<div class=\"x-container  \">\n<div class=\"x-column x-sm x-2-3\"><img fetchpriority=\"high\" decoding=\"async\" class=\"x-img man x-img-rounded aligncenter\" src=\"http:\/\/cybersecurity.industries\/wp-content\/uploads\/2017\/02\/digital-security-risk.png\" alt=\"Placeholder\" width=\"679\" height=\"423\" \/><\/div>\n<h4 class=\"h-custom-headline\"><strong>Digital Security Risk<\/strong><strong>Management<\/strong><\/h4>\n<div class=\"x-text none\">\n<p>Harness your existing security infrastructure into a single, integrated, web based, multi-agent cyber protection system<\/p>\n<\/div>\n<h4 class=\"h-custom-headline\">Total Business Coverage<\/h4>\n<ul class=\"x-ul-icons mvn\">\n<li class=\"x-li-icon\">Discover<\/li>\n<li class=\"x-li-icon\">Prepare<\/li>\n<li class=\"x-li-icon\">Verify<\/li>\n<\/ul>\n<\/div>\n<div class=\"x-container  left-text  max width\">\n<div class=\"x-column x-sm x-1-3\">\n<h4 class=\"h-custom-headline\"><\/h4>\n<h3 class=\"h-custom-headline\">Unified Risk Framework<\/h3>\n<div class=\"x-text none\">\n<p>Overlay software that elevates your existing security systems<br \/>\nAudit anything, unify your security systems, report on anything &amp; match risk to business outcomes<\/p>\n<h3><strong>Highlights<\/strong><\/h3>\n<\/div>\n<ul class=\"x-ul-icons mvn\">\n<li class=\"x-li-icon\">Policy management<\/li>\n<li class=\"x-li-icon\">Incident\/Alarm management<\/li>\n<li class=\"x-li-icon\">Compliancy Management GDPR<img decoding=\"async\" class=\"x-img man x-img-rounded aligncenter\" src=\"http:\/\/cybersecurity.industries\/wp-content\/uploads\/2017\/02\/unifiedrisk.png\" alt=\"Placeholder\" width=\"720\" height=\"367\" \/><\/li>\n<\/ul>\n<\/div>\n<div class=\"x-column x-sm x-2-3\"><\/div>\n<\/div>\n<div class=\"x-container   max width\">\n<div class=\"x-column x-sm x-2-3\"><\/div>\n<div class=\"x-column x-sm x-1-3\">\n<h3 class=\"h-custom-headline\">Summary<\/h3>\n<div class=\"x-text none\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"x-img man x-img-rounded alignleft\" src=\"http:\/\/cybersecurity.industries\/wp-content\/uploads\/2017\/02\/threatscape..png\" alt=\"Placeholder\" width=\"376\" height=\"198\" \/><strong>GRCyber\u2122 enterprise<\/strong> governance, risk and compliance application into a single, integrated, web based, multi-agent cyber protection system.<\/p>\n<p>CSO\u2019s can now secure their assets via this single, real time cyber protection system that takes the best of all the many innovative, cutting edge network agents and sensors, and harnesses them to counter the myriad of opportunities that cyber criminals now have at their disposal.<\/p>\n<\/div>\n<h4 class=\"h-custom-headline\">Highlights<\/h4>\n<ul class=\"x-ul-icons mvn\">\n<li class=\"x-li-icon\">Risk Assessments on all assets and facilities<\/li>\n<li class=\"x-li-icon\">security reports for the Board<\/li>\n<li class=\"x-li-icon\">Alert to emerging risks in real time, using dashboards<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"x-section-3\" class=\"x-section  center-text \">\n<div class=\"x-container   max width\">\n<div class=\"x-column x-sm x-1-1\">\n<h2 class=\"h-custom-headline man\" style=\"text-align:center;\"><span style=\"color:#00ccff;\">Over 40+ international standards<\/span><br \/>\n<span style=\"color:#00ccff;\">with full authoring capability<\/span><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"x-section-4\" class=\"x-section  center-text \">\n<div class=\"x-container   max width\">\n<div class=\"x-column x-sm x-1-1\">\n<h1 class=\"h-custom-headline man\" style=\"text-align:center;\">Fast implementation<\/h1>\n<hr class=\"x-hr\" \/>\n<div class=\"x-text none\">\n<p class=\"man\"><img decoding=\"async\" class=\"x-img man x-img-none alignleft\" src=\"http:\/\/cybersecurity.industries\/wp-content\/uploads\/2017\/02\/8-tco.jpg\" alt=\"Placeholder\" \/><\/p>\n<p class=\"man\"><strong>GRCyber\u2122 can be installed in a matter of days. Training is typically 5 days and clients can perform their first compliance audits within weeks..<\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"x-container   max width\"><\/div>\n<\/div>\n<div id=\"x-section-5\" class=\"x-section  center-text \">\n<div class=\"x-container   max width\">\n<div class=\"x-column x-sm x-1-1\"><img decoding=\"async\" class=\"x-img man x-img-thumbnail aligncenter\" src=\"http:\/\/cybersecurity.industries\/wp-content\/uploads\/2017\/02\/steps.png\" alt=\"Placeholder\" \/><\/div>\n<\/div>\n<div class=\"x-container   max width\">\n<div class=\"x-column x-sm x-1-1\">\n<div class=\"x-text none\">\n<p class=\"man\">\n<p class=\"man\"><strong>GRCyber\u2122 now includes the required GDPR management capability, eg knowing what data you have, where it is and how it is protected and what threat impacts it. It can also interact with your other systems to see whether data has been corrected\/deleted\/transferred within the specified timescale<\/strong><\/p>\n<p class=\"man\">\n<\/div>\n<p><img decoding=\"async\" class=\"x-img x-img-none\" src=\"http:\/\/cybersecurity.industries\/wp-content\/uploads\/2017\/02\/timeline.png\" \/><\/p>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"x-section-7\" class=\"x-section  center-text \">\n<div class=\"x-container   max width\">\n<div class=\"x-column x-sm x-1-1\">\n<h1 class=\"h-custom-headline man\" style=\"text-align:center;\">Get Ready<\/h1>\n<\/div>\n<\/div>\n<div class=\"x-container   max width\">\n<div class=\"x-column x-sm x-1-1\">\n<h1 class=\"h-custom-headline man\" style=\"text-align:center;\">And give us a call!<\/h1>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"  wp-image-340 aligncenter\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/02\/2-general_data_protection_regulation___p_ssport_privacy_by_design.jpg\" alt=\"2-general_data_protection_regulation___p_ssport_privacy_by_design\" width=\"608\" height=\"240\" srcset=\"https:\/\/hjinterim.tech\/wp-content\/uploads\/2017\/02\/2-general_data_protection_regulation___p_ssport_privacy_by_design.jpg 532w, https:\/\/hjinterim.tech\/wp-content\/uploads\/2017\/02\/2-general_data_protection_regulation___p_ssport_privacy_by_design-300x118.jpg 300w\" sizes=\"(max-width: 608px) 100vw, 608px\" \/><\/p>\n<\/div>\n<div class=\"tinyText style_SkipStroke_1\"><\/div>\n<div class=\"tinyText style_SkipStroke_1\"><\/div>\n<div id=\"footer_layer\">\n<div class=\"bumper\">\n<h3 style=\"text-align:center;\"><strong>Distributor Germany<\/strong><\/h3>\n<p style=\"text-align:center;\"><span style=\"color:#00ccff;\"><strong>P@ssport GmbH Germany<\/strong><\/span><\/p>\n<p style=\"text-align:center;\">Phone: <strong><span style=\"color:#00ccff;\">+49 (0) 157 7214 3686<\/span><\/strong><\/p>\n<p style=\"text-align:center;\">Website: <span style=\"color:#00ccff;\">\u00a0<a style=\"color:#00ccff;\" href=\"http:\/\/hj-interim.com\/Home.html\">HJ-INTERIM<\/a>\u00a0<\/span><\/p>\n<p style=\"text-align:center;\">Mail: <span style=\"color:#00ccff;\"><a style=\"color:#00ccff;\" href=\"mailto:jansen.henkjan@gmail.com\">Request a demo<\/a><\/span><\/p>\n<h3 style=\"text-align:center;\"><strong>Distributor Netherlands<\/strong><\/h3>\n<p style=\"text-align:center;\"><span style=\"color:#00ccff;\"><strong>P@ssport Netherlands<\/strong><\/span><\/p>\n<p style=\"text-align:center;\">Phone: <strong><span style=\"color:#00ccff;\">+31 (0) 70 7370471<\/span><\/strong><\/p>\n<p style=\"text-align:center;\">Website:<span style=\"color:#00ccff;\"> <a style=\"color:#00ccff;\" href=\"http:\/\/cybersecurity.industries\">P@ssport Netherlands<\/a><\/span><\/p>\n<p style=\"text-align:center;\">Mail: <span style=\"color:#00ccff;\"><a style=\"color:#00ccff;\" href=\"mailto:info@cybersecurity.industries\">Request a demo<\/a><\/span><\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>GDPReady\u2122 \u00a0CYBER SECURITY IS A VERY REAL BUSINESS RISK, NOT JUST A TECHNOLOGY PROBLEM\u2019 UNDER GDPR, BREACH COSTS WILL SOAR The GDPReady\u2122 is available now General Data Protection Regulation COMPLIANCY There will be new requirements on where data is processed the General Data Protection Regulation (GDPR) is set to replace the Data Protection Directive 95\/46\/ec &#8230; <a title=\"GDPR Solution, The Smart Way&#8230;\" class=\"read-more\" href=\"https:\/\/hjinterim.tech\/index.php\/2017\/02\/10\/our-gdpr-solution-the-smart-way\/\">Read more<span class=\"screen-reader-text\">GDPR Solution, The Smart Way&#8230;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"quote","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[20,25],"tags":[33,47],"class_list":["post-297","post","type-post","status-publish","format-quote","hentry","category-gdpr","category-security","tag-compliancy","tag-triple-a","post_format-post-format-quote"],"_links":{"self":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts\/297","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/comments?post=297"}],"version-history":[{"count":0,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts\/297\/revisions"}],"wp:attachment":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/media?parent=297"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/categories?post=297"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/tags?post=297"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}