{"id":448,"date":"2017-02-13T04:20:02","date_gmt":"2017-02-13T03:20:02","guid":{"rendered":"https:\/\/hjinterim.wordpress.com\/?p=448"},"modified":"2017-02-13T04:20:02","modified_gmt":"2017-02-13T03:20:02","slug":"compliancy-expectations-of-the-unexpected","status":"publish","type":"post","link":"https:\/\/hjinterim.tech\/index.php\/2017\/02\/13\/compliancy-expectations-of-the-unexpected\/","title":{"rendered":"Compliance Expectations of the Unexpected"},"content":{"rendered":"<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-449\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/02\/compliancy.jpg\" alt=\"compliancy\" width=\"698\" height=\"400\" srcset=\"https:\/\/hjinterim.tech\/wp-content\/uploads\/2017\/02\/compliancy.jpg 698w, https:\/\/hjinterim.tech\/wp-content\/uploads\/2017\/02\/compliancy-300x172.jpg 300w\" sizes=\"(max-width: 698px) 100vw, 698px\" \/><\/p>\n<p>The EU General Data Protection Regulation (EU GDPR) is a hot topic for Boards, business leaders and IT teams alike. But it is not just about proving compliance to regulators after 25 May 2018. Foremost individuals will want to know that they can trust <span style=\"color:#00ccff;\"><strong>your organization<\/strong><\/span> to protect <span style=\"color:#00ccff;\"><strong>their personal data.<\/strong><\/span>\u00a0So GDPR compliance will be critical to building trust and earning loyalty.\u00a0\u2028P@ssport is ready to support your smooth transition within several weeks to the new world of GDPR. Our cloud services are designed not only to prepare <span style=\"color:#00ccff;\"><strong>your organization<\/strong><\/span> for <span style=\"color:#00ccff;\"><strong>compliancy<\/strong><\/span> but also to ensure you can continue to <span style=\"color:#00ccff;\"><strong>protect personal data<\/strong><\/span> into the future.<\/p>\n<p>Further more P@ssport does have the best secure environment available on the market Triple-A. Despite what competitors saying, we can proof that we are secure! We did quite some penetration testing with a result of 0% vulnerability nor security breach!<\/p>\n<p>Recently I was talking with a lot of CEO\u2019s and CIO\u2019s from large companies within the automotive and financial industry in Germany, USA and the Netherlands.<\/p>\n<p>I was asking them all the same six questions namely:<\/p>\n<ol>\n<li><span style=\"color:#00ccff;\"><strong>How:<\/strong><\/span> Do you have compliancy covered in your management plan?<\/li>\n<li><span style=\"color:#00ccff;\"><strong>How:<\/strong><\/span> You are dealing with the GDPR implementation?<\/li>\n<li><span style=\"color:#00ccff;\"><strong>What:<\/strong><\/span> Are you aware of your current environment security \/ compliancy and do you have awareness how this is being handled?<\/li>\n<li><span style=\"color:#00ccff;\"><strong>What:<\/strong><\/span> Are you interested in a full overview how your current environment is secured?<\/li>\n<li><span style=\"color:#00ccff;\"><strong>Who:<\/strong><\/span> Is currently busy with the evaluation of these implementations and analysis?<\/li>\n<li><span style=\"color:#00ccff;\"><strong>Who: <\/strong><\/span>It this method a proven method (case studies)<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\" size-full wp-image-480 aligncenter\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/02\/1392-119.jpg\" alt=\"1392-119\" width=\"640\" height=\"360\" srcset=\"https:\/\/hjinterim.tech\/wp-content\/uploads\/2017\/02\/1392-119.jpg 640w, https:\/\/hjinterim.tech\/wp-content\/uploads\/2017\/02\/1392-119-300x169.jpg 300w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>The outcome was a real surprise to me? Most of them told me that their PIO or security officer was busy to make a plan but where not yet started with making actual plans? In some cases it was all related to the budget and did not fit within the budget from this year? Which was really a shock to me! Is this not called strategic planning! I was asking if they did not plan this in 2016 when determining the budget for 2017 and some of them told me that they did not were aware of this EU compliancy. I see some not working communication channels here.<\/p>\n<p>So you see that even higher management, board members are not very well informed about the risks they are going to take for this year and certainly for 28 may 2018.<\/p>\n<p>In my opinion the sooner you start this compliancy, the better your organization will face to the near future and reduce the chance of having a security breach.<\/p>\n<p><span style=\"color:#808080;\"><img decoding=\"async\" class=\" size-full wp-image-455 aligncenter\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/02\/going_to_rsa_2017_-watch_out_for_the_sandman___peter_rus_lion___pulse___linkedin1.jpg\" alt=\"going_to_rsa_2017_-watch_out_for_the_sandman___peter_rus_lion___pulse___linkedin\" width=\"393\" height=\"62\" srcset=\"https:\/\/hjinterim.tech\/wp-content\/uploads\/2017\/02\/going_to_rsa_2017_-watch_out_for_the_sandman___peter_rus_lion___pulse___linkedin1.jpg 393w, https:\/\/hjinterim.tech\/wp-content\/uploads\/2017\/02\/going_to_rsa_2017_-watch_out_for_the_sandman___peter_rus_lion___pulse___linkedin1-300x47.jpg 300w\" sizes=\"(max-width: 393px) 100vw, 393px\" \/><\/span><\/p>\n<h3>I remember reading some great blogs from Mr. Peter Rus, Strategic Edge Computing Advisor on these topics, which I would strongly recommend you to read.<\/h3>\n<p style=\"text-align:center;\"><a href=\"https:\/\/www.linkedin.com\/pulse\/illusion-being-control-part-1-peter-rus?trk=mp-reader-card\">Illusion-being-control-part-1<\/a><\/p>\n<p style=\"text-align:center;\"><a href=\"https:\/\/www.linkedin.com\/pulse\/illusion-being-control-part-2-an-ounce-prevention-worth-peter-rus?trk=mp-reader-card\">Illusion-being-control-part-2-an ounce of prevention is worth a pound of response activity<\/a><\/p>\n<p style=\"text-align:center;\"><a href=\"https:\/\/www.linkedin.com\/pulse\/illusion-being-control-part-3-castles-from-clouds-peter-rus%3Ftrk=mp-reader-card\">Illusion-being-control-part-3-castles-from-clouds<\/a><\/p>\n<p style=\"text-align:center;\"><a href=\"https:\/\/www.linkedin.com\/pulse\/just-another-app-wall-peter-rus-lion?trk=mp-reader-card\">Just-another-app-wall<\/a><\/p>\n<p style=\"text-align:center;\"><a href=\"https:\/\/www.linkedin.com\/pulse\/going-rsa-2017-watch-out-sandman-peter-rus-lion?trk=mp-reader-card\">Going-rsa-2017-watch-out-sandman<\/a><\/p>\n<p style=\"text-align:center;\"><a href=\"https:\/\/www.linkedin.com\/pulse\/pssport-triple-a-aggressive-cyberdefense-peter-rus-lion?trk=mp-reader-card\">P@ssport-triple-a-aggressive-Cyberdefence<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Today I had to give a guest lecture in Cologne, Germany. And every time the same question was coming back to me?<\/p>\n<p style=\"text-align:center;\"><span style=\"color:#00ccff;\"><strong>How do I start?<\/strong> <\/span><\/p>\n<p style=\"text-align:center;\"><span style=\"color:#00ccff;\"><strong>Where to begin?<\/strong>\u00a0<\/span><\/p>\n<p style=\"text-align:center;\"><span style=\"color:#00ccff;\"><strong>Do I have to read first the entire EU regulation, the NIS directive?<\/strong><\/span><\/p>\n<p style=\"text-align:center;\"><img loading=\"lazy\" decoding=\"async\" class=\" size-full wp-image-481 aligncenter\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/02\/fotolia_80516719_subscription_monthly_m.jpg\" alt=\"Cute woman with facial expression of surprise\" width=\"1688\" height=\"1125\" srcset=\"https:\/\/hjinterim.tech\/wp-content\/uploads\/2017\/02\/fotolia_80516719_subscription_monthly_m.jpg 1688w, https:\/\/hjinterim.tech\/wp-content\/uploads\/2017\/02\/fotolia_80516719_subscription_monthly_m-300x200.jpg 300w, https:\/\/hjinterim.tech\/wp-content\/uploads\/2017\/02\/fotolia_80516719_subscription_monthly_m-1024x682.jpg 1024w, https:\/\/hjinterim.tech\/wp-content\/uploads\/2017\/02\/fotolia_80516719_subscription_monthly_m-768x512.jpg 768w, https:\/\/hjinterim.tech\/wp-content\/uploads\/2017\/02\/fotolia_80516719_subscription_monthly_m-1536x1024.jpg 1536w\" sizes=\"(max-width: 1688px) 100vw, 1688px\" \/><\/p>\n<p>It shows that even strategist like a security officer, PIO, or an enterprise\/solution architect is not even aware of the upcoming risks?<\/p>\n<p>But do not worry humans are very fast to adopt themselves and are quick learners<\/p>\n<p>I was giving them all the same answer, that there is a <strong><span style=\"color:#00ccff;\">great solution<\/span><\/strong> for this topic and it starts all within themselves with their own awareness and secondly to look for a solution.<\/p>\n<p>I was explaining them that we as <span style=\"color:#3366ff;\"><strong><a style=\"color:#3366ff;\" href=\"http:\/\/WWW.CYBERSECURITY.INDUSTRIES\" target=\"_blank\" rel=\"noopener\">P@ssport<\/a><\/strong> <\/span>are the only <strong><span style=\"color:#3366ff;\"><a style=\"color:#3366ff;\" href=\"https:\/\/complyadvantage.com\/what-is-regtech\">Reg Tech<\/a> <\/span><\/strong>Company in the Netherlands, and have the solution for this, so that the companies they working for can be <span style=\"color:#00ccff;\"><strong>compliant<\/strong><\/span> and most of all <span style=\"color:#00ccff;\"><strong>secure<\/strong><\/span>.<\/p>\n<p>Our Triple-A and GDPR Assessment is the ideal starting point on your journey.<\/p>\n<blockquote>\n<p style=\"text-align:center;\"><span style=\"color:#3366ff;\"><strong>Make the right choice and request a demo<\/strong><\/span><\/p>\n<p style=\"text-align:center;\"><span style=\"color:#3366ff;\"><strong>Make your choice\u2026<\/strong><\/span><\/p>\n<p style=\"text-align:center;\"><span style=\"color:#3366ff;\"><strong>Which road will it be?<\/strong><\/span><\/p>\n<\/blockquote>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"  wp-image-464 aligncenter\" src=\"https:\/\/hjinterim.files.wordpress.com\/2017\/02\/success.jpeg\" alt=\"success\" width=\"670\" height=\"383\" \/><\/p>\n<p style=\"text-align:center;\"><strong>Remember <span style=\"text-decoration:underline;color:#00ccff;\">awareness<\/span> is the <span style=\"color:#00ccff;\">first step<\/span> after this, you see the vulnerabilities within your own environment!<\/strong><\/p>\n<p style=\"text-align:center;\"><strong>It is better to prevent that to suffer from the consequences\u2026<\/strong><\/p>\n<h3 style=\"text-align:center;\"><strong><a style=\"font-style:inherit;\" href=\"http:\/\/www.linkedin.com\/pulse\/enterprise-cyber-risk-management-strategy-according-pssport-rus-lion?trk=prof-post\">P@ssport<\/a> &#8211;\u00a0proud defender of critical infrastructure since 2012<\/strong><\/h3>\n<p style=\"text-align:center;\"><strong><a style=\"font-style:inherit;\" href=\"http:\/\/mailto:jansen.henkjan@gmail.com\/\">Prof. Dr. Ir. Henk Jan Jansen<\/a><\/strong><\/p>\n<p style=\"text-align:center;\"><strong><a style=\"font-style:inherit;\" href=\"http:\/\/www.cybersecurity.industries\/\">WWW.CYBERSECURITY.INDUSTRIES<\/a><\/strong><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The EU General Data Protection Regulation (EU GDPR) is a hot topic for Boards, business leaders and IT teams alike. But it is not just about proving compliance to regulators after 25 May 2018. Foremost individuals will want to know that they can trust your organization to protect their personal data.\u00a0So GDPR compliance will be &#8230; <a title=\"Compliance Expectations of the Unexpected\" class=\"read-more\" href=\"https:\/\/hjinterim.tech\/index.php\/2017\/02\/13\/compliancy-expectations-of-the-unexpected\/\">Read more<span class=\"screen-reader-text\">Compliance Expectations of the Unexpected<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"quote","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[25],"tags":[33,34,37,40,47],"class_list":["post-448","post","type-post","status-publish","format-quote","hentry","category-security","tag-compliancy","tag-cyber","tag-gdpr","tag-iot","tag-triple-a","post_format-post-format-quote"],"_links":{"self":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts\/448","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/comments?post=448"}],"version-history":[{"count":0,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/posts\/448\/revisions"}],"wp:attachment":[{"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/media?parent=448"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/categories?post=448"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hjinterim.tech\/index.php\/wp-json\/wp\/v2\/tags?post=448"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}