Blog

Understanding Penetration Testing

We look at some of the common pitfalls for organisations when they consider Penetration Testing and how to avoid them to ensure a successful approach.

read more »

The Definition of Cloud Computing

What actually is Cloud Computing? We've quizzed our in-house experts to give you an overview.

read more »

Espion Training

Certified Risk Manager (ISO 31000)

This course gives attendees the competence to master a model for implementing risk management processes throughout their organisation using the ISO 31000:2009 standard as a reference framework.  

Based on practical exercises and case studies, course attendees gain the necessary knowledge and skills to perform an optimal risk assessment.

Find out more >

Events

Striking a Balance between Security and Innovation during Cloud Adoption

Striking a Balance between Security and Innovation during Cloud Adoption

This event will examine the current issues that are present in Cloud Computing today and aim to find a solution to the conflict that exists in organisations between the IT department aiming to achieve fully secure systems and the business, striving to achieve a highly innovative and efficient workplace through a multitude of different Cloud apps.

Read More »
CAMINO

CAMINO

Espion is a collaborating member of CAMINO, an EU funded research project consisting of 10 consortium members. The aim of this project is to provide the European Commission with a comprehensive roadmap to help improve resilience against cybercrime and cyber terrorism. The first version of CAMINO is now complete and open to public comment. It is available to download here.

Read More »

Resources

  • Espion Insight: EU Data Protection Reform

    This paper discusses the nature and scope of the planned reforms, the considerable cross-business challenges they represent and how best to address them.

    download »
  • Espion White Paper: Information Governance in the Era of Big Data

    This paper highlights what an Information Governance framework looks like, how it applies to both structured and unstructured data, and identify how this differs when you have to deal with Big Data.

    download »
  • Payment Card Industry (PCI) Data Security Standard Requirements and Security Assessment Procedures Version 3.1

    This document combines the 12 PCI DSS requirements and corresponding testing procedures into a security assessment tool.

    download »

EU Data Protection Reform: An Overview