Who’s behind the access request?

  Today is the day – the infamous 25th of May 2018. When we woke up this morning GDPR was finally in effect… I was expecting this morning to be something really extra. I was expecting something like that the sky would be green and the sun would have been blue. But it turned out… Continue Reading


Word of the day: Panic!

Tomorrow is the 25th of Maj 2018 Ever heard of this new law – GDPR? If you haven’t, well – good for you then. That means that you’re not in any way involved in processing personal data. Not in your line of work, or in sports clubs or so. It would also mean that you’re… Continue Reading


What’s most important when building an ISMS or Management System?

I’d like to share a few thoughts about what’s important when building a Management System in general, and an Information Security Management System in particular. Please consider this being tips and ideas from me to you. This post relates to ISO 27001:2013 and the standards following the new model and structure. More then one standard?… Continue Reading


Comments about the “Six myths CEOs believe about security”

A couple of days ago I read the CSO article Six myths CEOs believe about security that I’d like to make some personal comments on. 1. Attackers can’t be stopped The author, Roger A. Grimes, mentions that one of the myths is the one that there’s no efficient way of stopping attackers. Personally, I believe that… Continue Reading