IT security essentially reduces information related risk to an acceptable ratio of risk to cost. For this reason, the process begins with an extensive risk assessment – a tried and tested process that can be improved. I am inspired by the work of Douglas W. Hubbard on this topic. Here’s why ‘Part II’.
The EU Cybersecurity Act is entering into force! The ‘act’ takes the form of a regulation (Regulation 2019/881), the final version of which can be found here.
EU Cybersecurity Act has two main objectives: