DORA compliance for ICT Providers - What Do You Need to Do?

50:44
Navigating the 2024 Privacy Landscape with ISO 27001 and CyberComply

1:00:04
Cyber Essentials vs ISO 27001 – Decoding the key differences

4:58:01
Public defence: Neural Modeling of Musical Devices

25:25
Flash briefing CrowdStrike – what went wrong and how to avoid being Strike 2

1:00:06
Meeting NIS 2 requirements with ISO 27001

34:14
AI Compliance for Startups: What You Need to Know Before Your Prospects Start Asking for ISO 42001

1:00:05
Europrivacy Certification Integrating GDPR with National Privacy Laws

1:00:47