Dive into our blog

Clear filters
Filter by
Clear
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
GRC
 / 
Information Security
 / 
Data protection
 / 
Best practices
 / 

What is a GRC system? A simpler path to compliance

Best practices
 / 
Data protection
 / 
Information Security
 / 
GRC
 / 

Trend: How to make company-wide collaboration work

Awareness & Training
 / 
GRC
 / 
Best practices
 / 
Data protection
 / 
Information Security
 / 

How to build a culture that supports information security and data protection

Data protection
 / 
DPIA
 / 

Behind the firewall: Claire Archibald

Information Security
 / 
Data protection
 / 
GRC
 / 

What is GRC? A simple breakdown of Governance, Risk, and Compliance

Data protection
 / 
Information Security
 / 
GRC
 / 

Why GRC is crucial in data protection and information security

Information Security
 / 
Data protection
 / 
GRC
 / 

What is GRC software and what makes it powerful?

Best practices
 / 
Information Security
 / 

Infosec frameworks: An overview of the most common ones

GRC
 / 
Best practices
 / 
Information Security
 / 
Data protection
 / 

Example: information security governance model (inspired by ISO 27001/NIS2)

Best practices
 / 
GRC
 / 
Data protection
 / 
Information Security
 / 

Example: governance model for data protection (GDPR)

Information Security
 / 
Best practices
 / 
Data protection
 / 
GRC
 / 

What is a governance model? In data protection and information security

Information Security
 / 
GRC
 / 
Data protection
 / 
Best practices
 / 

What is governance?

Best practices
 / 
Information Security
 / 

6 Takeaways from Infosec at Billund Airport

Best practices
 / 
Information Security
 / 
Data protection
 / 
GRC
 / 

The power of unity: 10 reasons why Data Protection and Information Security should join forces

Best practices
 / 
Data protection
 / 
Success stories
 / 

Toms Group: Structure and overview free up time for important tasks

Powered by Wired Relations.
The GRC solution.

img