Dora Petranyi | CMS, Emma Burnett | CMS, Tom De Cordier | CMS11 min read
Martin Cloake2 min read
Carmen Cracknell1 min read
Kevin Kinsella3 min read
Dora Petranyi | CMS, Emma Burnett | CMS, Tom De Cordier | CMS11 min read
Vasilka Lalevska2 min read

Practical advice and steps for organizations to understand and comply with sovereignty and localization rules.
Dora Petranyi | CMS, Emma Burnett | CMS, Tom De Cordier | CMS11 min read

An Ashurst panel, together with guest speaker Will Barlow of Crowdstrike, discussed what steps you should be taking to prepare for a cybersecurity incident.
Jean Hurley, Martina Lindberg3 min read

New cybersecurity package includes changes to the Cybersecurity Act and NIS 2 Directive.
Vasilka Lalevska2 min read

The EU CRA makes cybersecurity mandatory for all products with digital elements.

By promoting a consistent and data-driven approach to investment evaluation, ACER’s Guide will enable regulators and industry stakeholders to work collaboratively.
Jean Hurley3 min read

Adequate preparation, identifying what and who is critical, and, above all, “practice, practice, practice” highlighted.
Martina Lindberg, Jean Hurley3 min read

The regulation creates an EU health “data space” and is designed to facilitate access to and control of health data.

Reporting/registration requirements and the consequences for organizations in countries where implementation of the NIS2 Directive is delayed.