Johan SydseterCyber Security in the c-suite and board rooms — Sikkerhetsfestivalen 2022Disclaimer: Freely reproduced from the panel on “Cyber Security in the c-suite and board rooms” on “Sikkerhetsfestivalen” 2022. The…Aug 30, 2022Aug 30, 2022
Johan SydseterGDPR compliant event sourcing with HashiCorp VaultEvents are records from the past. In the same way, as we can not rewrite the history books, we can’t remove immutable events.Sep 7, 20191Sep 7, 20191
Johan SydseterContinuous delivery for data protection by design — customer satisfaction and incident response…A good incident response plan is about more than just being compliant, it’s about customer and employee satisfaction.Jun 4, 2019Jun 4, 2019
Johan SydseterContinuous delivery for data protection by design and by default — Security and privacy reviewsThe supervisory authority is tasked with periodically reviewing the operation of the data controller. (article.41)…Jun 3, 2019Jun 3, 2019
Johan SydseterContinuous delivery for data protection by design — Security and privacy testing microservices.Security is not something static that is defined once. Security is a dynamic property that changes over time.Jun 2, 2019Jun 2, 2019
Johan SydseterContinuous delivery for data protection by design — Quality assurance- and approval of tools and …Just because you’re college, David, said it was ok, doesn’t mean that you can use whatever technology you want without approval or review.May 27, 2019May 27, 2019
Johan SydseterContinuous delivery for data protection by design— Automating traceability, visibility and approvalEnsuring traceability and visibility are the two most important pillars for the application’s life cycle and for data protection by design.May 21, 2019May 21, 2019
Johan SydseterTo encrypt, or not to encrypt, that is the question:whether ’tis nobler in the mind from the risk of security and privacy breaches to suffer The slings and arrows of outrageous fortune, …Mar 8, 2019Mar 8, 2019
Johan SydseterThe legal obligations of the data controller.It’s time we talk about the elephant in the room. The legal obligations of the data controller.Feb 28, 2019Feb 28, 2019
Johan SydseterContinuous delivery for data protection by design — Restricting access to privileged environments.Restricting access to privileged environments is the most important concern when protecting personal information and the easiest to do.May 15, 2019May 15, 2019