17 Nov '22
Full-service law firm Ploum and cybersecurity service provider Tesorion have entered into a strategic partnership. The shared ambition of Ploum and Tesorion is to make and keep organisations cyber-secure. They are therefore joining forces to advise organisations on cybersecurity and thereby prepare them for the arrival of NIS 2, including through training courses and organising free events. Establishing third-party risk management requires a comprehensive approach where the deployment of people, technology and processes must be seamlessly aligned. Thanks to this collaboration, the barrier between contracting and technically guaranteeing measures is removed. Ploum and Tesorion will also continue their services independently.
"We are becoming increasingly dependent on digital infrastructure on several fronts, and therefore more vulnerable as organisations and as a country," says Peter Centi, manager Digital Risk Protection at Tesorion. "Cybersecurity has long ceased to be just about technology. Risk assessments, setting up organisations correctly, drawing up policy, liability, the obligation to provide information and, last but not least, after-crisis care require specialist knowledge. That is why we join forces with Ploum. In the field of cybersecurity, our services run in parallel, allowing us, for instance during a data breach or ransomware attack, to take several actions at once. By acting together and combining our strengths, we can move faster in the event of a cyberattack. That is hugely important in order to limit the damage."
The technical and legal sides of cybersecurity are inextricably linked. Cybercriminals are also increasingly looking for alternatives that transcend platforms in order to cause maximum damage. Organisations may have their own information security in order, but information security at chain partners is often out of their control. As a result, organisations are increasingly vulnerable to supply chain attacks.
To reduce the vulnerability of both businesses and our society, tighter European cybersecurity legislation, such as NIS 2 (Network and Information Security 2), is in the pipeline. This forces an increasing number of organisations to take their cybersecurity to the next level. NIS 2 calls for preventive actions that go beyond just setting up your own digital infrastructure properly. The entire chain will be looked at and proactively enforced because of the enormous damage an attack can have on our society.
Hugo van Aardenne, cyberlaw specialist and lawyer at Ploum: "There are all kinds of things awaiting organisations in the field of cybersecurity with the arrival of NIS 2. As a result, they will be faced with issues that often impact multiple areas in the organisation. It is incredibly important that they realise this now, so that there is sufficient time to take the necessary measures. Not only to comply with the law and liability and avoid claims, but also because you don't want your business processes to grind to a halt or work safety to be compromised. We also see it as our social duty to contribute to awareness in this area. Thanks to this partnership, we can act faster in the event of a data breach. We can rely on Tesorion's expertise, and Tesorion on ours."
11 Nov 24
14 Oct 24
13 Oct 24
07 Oct 24
13 Aug 24
13 Aug 24
04 Jun 24
13 May 24
02 May 24
08 Apr 24
04 Apr 24
21 Mar 24
Met uw inschrijving blijft u op de hoogte van de laatste juridische ontwikkelingen op dit gebied. Vul hieronder uw gegevens in om per e-mail op te hoogte te blijven.
Stay up to date with the latest legal developments in your sector. Fill in your personal details below to receive invitations to events and legal updates that matches your interest.
Follow what you find interesting
Receive recommendations based on your interests
{phrase:advantage_3}
{phrase:advantage_4}
We ask for your first name and last name so we can use this information when you register for a Ploum event or a Ploum academy.
A password will automatically be created for you. As soon as your account has been created you will receive this password in a welcome e-mail. You can use it to log in immediately. If you wish, you can also change this password yourself via the password forgotten function.