Glossary

European Union Agency for Cybersecurity (ENISA)

The European Union Agency  for Cybersecurity (ENISA) is an agency of the European Union (EU) that is  responsible for promoting cybersecurity in the EU. It was established in 2004  to help the EU member states to improve their cybersecurity capabilities and  to develop a common approach to cybersecurity within the EU.    ENISA's mandate includes a wide range of activities, such as:

→ Providing technical and scientific support to the EU and its member states  on cybersecurity matters
→ Developing and promoting best practices and guidelines on  cybersecurity
→ Conducting research and development on cybersecurity technologies and  practices
→ Providing training and awareness-raising on cybersecurity
→ Working with stakeholders, including industry, academia, and civil society,  to promote cybersecurity

ENISA plays an important role in helping the EU and its member states to  improve their cybersecurity posture and to address the growing threat of  cyber attacks. Its work is widely recognized and respected in the field of  cybersecurity, and it is an important source of expertise and guidance for  organizations and individuals in the EU and beyond.

GDPR

The General Data Protection Regulation (GDPR) is a regulation in EU law  on data protection and privacy for all individuals within the European Union  (EU) and the European Economic Area (EEA). It also addresses the export of  personal data outside the EU and EEA.

The GDPR establishes a set of standards for the collection, use, and  protection of personal data, and gives individuals more control over their  personal data. It applies to any organization, including companies and public  bodies, that processes the personal data of individuals in the EU, regardless  of whether the organization is based in the EU or not.    The GDPR sets out a number of rights for individuals in relation to their  personal data, including the right to be informed about the collection and  use of their personal data, the right to access their personal data, the  right to have their personal data erased (also known as the "right to be  forgotten"), and the right to object to the processing of their personal  data.

The GDPR also imposes a number of obligations on organizations that process  personal data, including the need to have appropriate safeguards in place to  protect personal data and to be transparent about their data collection and  use practices. Non-compliance with the GDPR can result in significant fines.

Compliance

Compliance refers to the  act of adhering to laws, regulations, guidelines, and standards that apply to  an organization. Compliance is an important aspect of risk management and  good governance, as it helps organizations to avoid legal and regulatory penalties  and reputational damage.

There are many different laws, regulations, and standards that  organizations may be required to comply with, depending on their industry,  size and location. These can include laws and regulations related to issues  such as employment, health and safety, the environment, data protection,  information and cyber security, and financial reporting. Compliance can also  involve adhering to industry-specific standards and guidelines, such as those  related to quality management or data security.

To ensure compliance, organizations may need to implement policies and  procedures, conduct regular training and audits, and establish systems for  monitoring and reporting. In some cases, organizations may also need to  appoint a compliance officer or establish a compliance department to oversee  compliance efforts. Effective compliance is essential for the long-term  success of any organization and is closely linked to issues such as risk  management, governance, and sustainability.

Cybersecurity and Infrastructure Security Agency (CISA)

The Cybersecurity and Infrastructure Security Agency (CISA) is an  agency of the U.S. Department of Homeland Security (DHS) that is responsible  for protecting the nation's critical infrastructure and federal networks from  cyber threats. It was established in 2018, and has a mandate to improve the  cybersecurity of the U.S. government and critical infrastructure, and to  coordinate the response to cyber incidents.

CISA's mandate includes a wide range of activities, such as:

→ Providing cybersecurity assistance to federal agencies and critical  infrastructure sectors
→ Developing and promoting cybersecurity standards, guidelines, and best  practices
→ Conducting research and development on cybersecurity technologies and practices
→ Providing training and awareness-raising on cybersecurity
→ Working with stakeholders, including industry, academia, and civil society,  to promote cybersecurity

CISA plays a key role in helping the U.S. government and critical  infrastructure sectors to improve their cybersecurity posture and to address  the growing threat of cyber attacks. Its work is widely recognized and  respected in the field of cybersecurity, and it is an important source of  expertise and guidance for organizations and individuals in the U.S. and  beyond.

Business Continuity Management (BCM)

Business Continuity  Management (BCM) is a process that aims to ensure that an organization is  able to maintain or quickly restore important business processes in the event  of unexpected disruptions such as natural disasters, cyber attacks, or other  incidents. The goal of BCM is to minimize the risk of downtime and associated  losses, and to ensure the continuation of business operations. BCM involves  identifying risks, analyzing the potential impacts of these risks, developing  measures to mitigate and manage risks, and conducting tests and exercises to  verify the effectiveness of these measures.  

Effective BCM requires organizations to have a plan in place to respond to  disruptions, as well as the necessary resources and procedures to implement  the plan. This can include measures such as backup systems and data,  alternative locations for employees to work from, and communication plans to  keep stakeholders informed. BCM is an important aspect of risk management and  good governance, and is essential for the long-term success of any  organization.

APT

An Advanced Persistent Threat (APT) is a type of cyber attack in which  an attacker gains access to a network and remains undetected for an extended  period of time. APT attacks are often targeted and well-planned, with the  goal of stealing sensitive information or disrupting the operations of the  victim organization. They are called "persistent" because the  attackers remain in the victim's network for an extended period of time,  often for months or even years. They are called "advanced" because  the attackers typically use a combination of sophisticated techniques to  bypass security measures and gain access to the network.

APT attacks are typically launched by nation-states or well-funded criminal  organizations, and are often highly customized to the specific target. They  may use a variety of tactics to gain access to the network, such as spear  phishing, social engineering, and zero-day vulnerabilities. Once the  attackers have gained access to the network, they may use various techniques  to maintain their presence and avoid detection, such as creating custom  malware and hiding their tracks in the network. APT attacks can be difficult  to detect and defend against, and can cause significant damage to an  organization's reputation and bottom line.

Let's get talking -
Meet us in person!