Data Breach Reporting
Step 3: Describing the impact and its potential consequences
When a breach occurs, it is important to be able to identify the potential consequences, as this is information you will need to provide when reporting the breach. Danish organisations reporting a breach to the Datatilsynet (Danish Data Protection Agency) will need to be able to identify how the breach affects data subjects.
Establishing how much damage a breach has caused can be difficult, even for a seasoned information security expert.
However, following a proven risk assessment process and framework will help you not only identify and assess the various risks you face, but also establish the potential impact of those risks on the confidentiality, integrity and availability of the data – as required by the EU GDPR (General Data Protection Regulation).
Discover our range of solutions and become #BreachReady
Plan ahead with our range of risk assessment products and services
Risk assessment is at the heart of information security best practice, as set out in the international standard ISO 27001.
Suitable for organisations of all sizes, vsRisk™ is a leading information security risk assessment tool that helps you conduct fast, accurate, auditable and hassle-free risk assessments year after year. Fully aligned with ISO 27001, it significantly cuts the consultancy costs typically associated with an information security risk assessment. The tool is available on an online platform or as desktop software.
Data protection impact assessments (DPIAs) under the GDPR are mandatory for any new personal data processing operations that are likely to result in a high risk to the rights and freedoms of individuals. Our DPIA service provides an on-site assessment of the data protection risks associated with a new or existing single data processing operation within your organisation and recommendations on the appropriate controls to mitigate these risks.
Business continuity management consultancy
BCM is a form of risk management that deals with the threat of business activities or processes being interrupted by external and/or internal factors. It involves making arrangements to ensure you can respond as effectively as possible in the event of a disruption so mission-critical functions will continue to provide an acceptable level of service.
Our consultancy team will help you implement a robust business continuity management programme with minimal business disruption and within a limited budget.
A complete set of easy to use, customisable documentation templates to enable you to plan for incidents and deploy a business continuity management (BCM) programme in line with the principles of ISO 22301, the international standard for BCM best practice.
For more information on how to conduct an information security risk assessment, download our free green paper - Risk Assessment and ISO 27001.
Speak to an expert
Understand the risk that your organisation faces and speak to one of our experts today. Don’t fall victim to a data breach, get #BreachReady now!