The GDPR is a comprehensive reform of the EU’s dataprotection regulations withbroad requirements in terms ofawareness, preparedness and readiness, which involve notonly people, policies & processes, but also technology.
OBRELA is well prepared to assist global organizations inestablishing preparedness and achieving compliance with the GDPR through our extensive portfolio of Cyber SecurityServices, which offer an unprecedented level of real-timeoperational visibility, security situational awareness, andpolicy – processes management and compliance monitoring.
Drawing on the experience of our highly-skilled professionals,we can help clients navigate the new regulatory requirementsand prepare for these changes, by offering the followingservices:
GDPR Compliance Assessment.
Perform a GDPR compliance gap analysis, which includes a High Level Readiness Assessment, assessment of non-compliance issues and suggestion for corrective actions.
Base your data protection strategy on a Risk Assessment against GDPR requirements and develop a Roadmap for Risk Remediation.
Carry out a Data Protection Impact Assessment.
Identify business areas which may be impacted by the GDPR on organization design, developing and implementing a privacy-by-design approach.
Define and Establish a Personal Data Environment.
Use the SWORDFISH Platform to develop and maintain a Data Inventory and Classification Scheme.
Create high levels of awareness and understanding about the regulation impacts by preparing and conducting Data Privacy Training and Awareness Campaigns.
Develop, Implement and Monitor a Data Protection Framework.
Development of Data Protection Policies and Procedures and monitor GDPR Compliance on an ongoing basis through the SWORDFISH Platform.
DPO outsourcing services.
The requirement for a designated Data Protection Officer can be outsourced to OBRELA, which through our highly skilled personnel can provide for all DPO responsibilities and assist the organization on a broader information security context in a dedicated, shared, full or part-time manner.
Pseudonymization of Data.
Apply Pseudonymisation and Encryption techniques on personal data, maintaining its usability and referential integrity for data processes, applications and services.
Third-Party Information Security Assessments.
Perform Information Security Assessments of Third Parties which have access / store / process personal data of the Organization.
Infrastructure & Application Security.
Proactively assess and manage your exposure to cyber threats on an ongoing basis through our comprehensive portfolio of Exposure Management Services.
Data Leakage Detection & Prevention.
Using our suite of Threat Intelligence, Threat Analytics, Threat Detection and Threat Prevention solutions, we dynamically protect your business by identifying, analyzing, predicting and preventing cyber threats and even unknown attacks.
Legal Advice & Decision Making Support.
Provide advice for inclusion of security requirements and clauses to contractual agreements.