Services
Achieve cyber security compliance & ISO certification
Active threat detection and assessment services
Cyber Essentials and Cyber Essentials Plus certification
Get in touch
Learn how we can support your cyber security challenges
Resources
Access our expert guides and checklists
Industry insights, views and articles
Latest events and updates from Ascentor
About Us
Join Ascentor – our current vacancies
Discover our cyber security accreditations
Learn more about our Partners
Learn more about working with Ascentor
Learn more about Ascentor and our heritage
Meet our team of accredited cyber security experts
We’re on your side – discover our business values
Contact Ascentor
Read what our clients are saying
Stay ahead of cyber security and management system trends. Access our latest in-depth guides, checklists, industry insights and articles created to ensure your organisation is informed and up-to-date.
Home » Resources » Page 12
Here is an introductory look at the use of metrics to measure cyber security effectiveness which includes dashboards and benchmarking with reference to existing frameworks.
It’s time to get up to date with the NIS Directive and answer questions about the organisations it applies to and how to comply.
We look at one of the Data Protection Officer’s responsibilities – ensuring that the data processor used by the organisation complies with data protection law.
This article is aimed to help anyone considering CE+ for their organisation. You might also be the CISO, the Head of IT, Security or Risk.
We look at the popular cyber and information security standards, certificates and regulations – the building blocks to improve your cyber resilience and compliance.
We explore the pros, cons and applicability of rules-based versus outcome-focused regulation, concluding with our rationale to why the latter is better for information security.