Data breach reporting: describing the impact and its potential consequences
What are the breach’s potential consequences? Has there been any harm to data subjects as a result of the breach?
Establishing how much damage a breach has caused can be difficult, even for a seasoned information security expert.
However, following a proven risk assessment process and framework will help you not only identify and assess the various risks you face, but also establish the potential impact of those risks on the confidentiality, integrity and availability of the data – as required by the EU GDPR (General Data Protection Regulation).
Save up to 20% with our Breach Essentials Bundles
Minimise and effectively assess your data breach risk with our range of tailored bundles designed to help you at every stage of the data breach readiness cycle – from threat detection and prevention to protection, response and recovery solutions.
Find out more
Discover our range of solutions
Plan ahead with our range of risk assessment products and services
Risk assessment is at the heart of information security best practice, as set out in the international standard ISO 27001.
Suitable for organisations of all sizes, vsRisk™ is a leading information security risk assessment tool that helps you conduct fast, accurate, auditable and hassle-free risk assessments year after year. Fully aligned with ISO 27001, it significantly cuts the consultancy costs typically associated with an information security risk assessment. The tool is available on an online platform or as desktop software.
Data protection impact assessments (DPIAs) under the GDPR are mandatory for any new personal data processing operations that are likely to result in a high risk to the rights and freedoms of individuals. Our DPIA service provides an on-site assessment of the data protection risks associated with a new or existing single data processing operation within your organisation and recommendations on the appropriate controls to mitigate these risks.
Business continuity management consultancy
BCM is a form of risk management that deals with the threat of business activities or processes being interrupted by external and/or internal factors. It involves making arrangements to ensure you can respond as effectively as possible in the event of a disruption so mission-critical functions will continue to provide an acceptable level of service.
Our consultancy team will help you implement a robust business continuity management programme with minimal business disruption and within a limited budget.
A complete set of easy to use, customisable documentation templates to enable you to plan for incidents and deploy a business continuity management (BCM) programme in line with the principles of ISO 22301, the international standard for BCM best practice.
Certificated training on assessing risks
Learn how to conduct an ISO 27001-compliant risk assessment from start to finish in just three days through practical risk management methodologies as promoted by ISO 27005 with this training course.
Further reading and learning
For more information on how to conduct an information security risk assessment, download our free green paper - Risk Assessment and ISO 27001.
Find out more
Learn about the key components of effective risk management
Speak to an expert
Understand the risk that your organisation faces and speak to one of our experts today.