top of page
![](https://static.wixstatic.com/media/4b0b8e_dcc7a564697b454d93386f67aa0b8d28~mv2.jpg/v1/fill/w_1920,h_1080,al_c,q_90,enc_avif,quality_auto/4b0b8e_dcc7a564697b454d93386f67aa0b8d28~mv2.jpg)
![bw_logo_pl.png](https://static.wixstatic.com/media/4b0b8e_db9d9c3c4e9b4047b90c63f25c67a736~mv2.png/v1/fill/w_184,h_42,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/bw_logo_pl.png)
Blog
![](https://static.wixstatic.com/media/4b0b8e_e57b01cdd2864e128858d9168593ff34~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/4b0b8e_e57b01cdd2864e128858d9168593ff34~mv2.webp)
![DORA - jak wypada w porównaniu z NIS 2?](https://static.wixstatic.com/media/4b0b8e_e57b01cdd2864e128858d9168593ff34~mv2.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/4b0b8e_e57b01cdd2864e128858d9168593ff34~mv2.webp)
Sebastian Burgemejster
29 wrz 2024
![](https://static.wixstatic.com/media/4b0b8e_1cfdae8823944cd0b76e299b08333595~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/4b0b8e_1cfdae8823944cd0b76e299b08333595~mv2.webp)
![DORA - co należy wiedzieć?](https://static.wixstatic.com/media/4b0b8e_1cfdae8823944cd0b76e299b08333595~mv2.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/4b0b8e_1cfdae8823944cd0b76e299b08333595~mv2.webp)
Sebastian Burgemejster
27 wrz 2024
![](https://static.wixstatic.com/media/4b0b8e_8e5d41cd38ad47c09185b64820035b48~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/4b0b8e_8e5d41cd38ad47c09185b64820035b48~mv2.webp)
![Kto potrzebuje certyfikacji ISO 27001?](https://static.wixstatic.com/media/4b0b8e_8e5d41cd38ad47c09185b64820035b48~mv2.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/4b0b8e_8e5d41cd38ad47c09185b64820035b48~mv2.webp)
Sebastian Burgemejster
25 wrz 2024
![](https://static.wixstatic.com/media/4b0b8e_946096401b99475c81cd9a55f2292343~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/4b0b8e_946096401b99475c81cd9a55f2292343~mv2.webp)
![Podstawy systemu zarządzania ryzykiem COSO](https://static.wixstatic.com/media/4b0b8e_946096401b99475c81cd9a55f2292343~mv2.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/4b0b8e_946096401b99475c81cd9a55f2292343~mv2.webp)
Sebastian Burgemejster
21 wrz 2024
![](https://static.wixstatic.com/media/4b0b8e_b6d12c01499842719955ce4c916f3302~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/4b0b8e_b6d12c01499842719955ce4c916f3302~mv2.webp)
![COSO vs. COBIT - jakie są różnice?](https://static.wixstatic.com/media/4b0b8e_b6d12c01499842719955ce4c916f3302~mv2.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/4b0b8e_b6d12c01499842719955ce4c916f3302~mv2.webp)
The SOC 2
18 wrz 2024
![](https://static.wixstatic.com/media/4b0b8e_c47e716261ad47e2a42cd15399b32e59~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/4b0b8e_c47e716261ad47e2a42cd15399b32e59~mv2.webp)
![Poruszanie się w obszarze zgodności z FedRAMP](https://static.wixstatic.com/media/4b0b8e_c47e716261ad47e2a42cd15399b32e59~mv2.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/4b0b8e_c47e716261ad47e2a42cd15399b32e59~mv2.webp)
Sebastian Burgemejster
15 wrz 2024
![](https://static.wixstatic.com/media/4b0b8e_5ae7178f24db4855a4630aeed8eeecf1~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/4b0b8e_5ae7178f24db4855a4630aeed8eeecf1~mv2.webp)
![Czym jest naruszenie ze strony osoby trzeciej?](https://static.wixstatic.com/media/4b0b8e_5ae7178f24db4855a4630aeed8eeecf1~mv2.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/4b0b8e_5ae7178f24db4855a4630aeed8eeecf1~mv2.webp)
The SOC 2
12 wrz 2024
![](https://static.wixstatic.com/media/03bf99_aaba364e6e2342d68ca68e04d3e5db4f~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/03bf99_aaba364e6e2342d68ca68e04d3e5db4f~mv2.webp)
![Jak sztuczna inteligencja zmienia bezpieczeństwo ofensywne ?](https://static.wixstatic.com/media/03bf99_aaba364e6e2342d68ca68e04d3e5db4f~mv2.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/03bf99_aaba364e6e2342d68ca68e04d3e5db4f~mv2.webp)
kcelinska
12 wrz 2024
![](https://static.wixstatic.com/media/4b0b8e_5f09fceefe0e41939a1bc0a524ebad45~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/4b0b8e_5f09fceefe0e41939a1bc0a524ebad45~mv2.webp)
![Czym jest COBIT?](https://static.wixstatic.com/media/4b0b8e_5f09fceefe0e41939a1bc0a524ebad45~mv2.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/4b0b8e_5f09fceefe0e41939a1bc0a524ebad45~mv2.webp)
The SOC 2
9 wrz 2024
![](https://static.wixstatic.com/media/4b0b8e_bfa8383ea21044c3853b46638b5a58c0~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/4b0b8e_bfa8383ea21044c3853b46638b5a58c0~mv2.webp)
![Prywatność i bezpieczeństwo - czym się różnią?](https://static.wixstatic.com/media/4b0b8e_bfa8383ea21044c3853b46638b5a58c0~mv2.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/4b0b8e_bfa8383ea21044c3853b46638b5a58c0~mv2.webp)
The SOC 2
6 wrz 2024
![](https://static.wixstatic.com/media/4b0b8e_315072e5204e4b59ad8d9b0bf5ccafc4~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/4b0b8e_315072e5204e4b59ad8d9b0bf5ccafc4~mv2.webp)
![Czym jest zgodność z wymogami FedRAMP?](https://static.wixstatic.com/media/4b0b8e_315072e5204e4b59ad8d9b0bf5ccafc4~mv2.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/4b0b8e_315072e5204e4b59ad8d9b0bf5ccafc4~mv2.webp)
The SOC 2
2 wrz 2024
![](https://static.wixstatic.com/media/4b0b8e_b0a3a94eea2a486ab8eb5cf8996511a1~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/4b0b8e_b0a3a94eea2a486ab8eb5cf8996511a1~mv2.webp)
![Jak przygotować się do audytu ISO?](https://static.wixstatic.com/media/4b0b8e_b0a3a94eea2a486ab8eb5cf8996511a1~mv2.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/4b0b8e_b0a3a94eea2a486ab8eb5cf8996511a1~mv2.webp)
The SOC 2
30 sie 2024
![](https://static.wixstatic.com/media/4b0b8e_8d81739132d84f8dac7adfdda6eb05f8~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/4b0b8e_8d81739132d84f8dac7adfdda6eb05f8~mv2.webp)
![Podstawy ISO 27001 - co należy wiedzieć?](https://static.wixstatic.com/media/4b0b8e_8d81739132d84f8dac7adfdda6eb05f8~mv2.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/4b0b8e_8d81739132d84f8dac7adfdda6eb05f8~mv2.webp)
Sebastian Burgemejster
27 sie 2024
![](https://static.wixstatic.com/media/4b0b8e_95d5a1340b4d4823b73f1b058619eaaf~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/4b0b8e_95d5a1340b4d4823b73f1b058619eaaf~mv2.webp)
![Niezbędne kroki w celu zapewnienia zgodności z RODO](https://static.wixstatic.com/media/4b0b8e_95d5a1340b4d4823b73f1b058619eaaf~mv2.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/4b0b8e_95d5a1340b4d4823b73f1b058619eaaf~mv2.webp)
The SOC 2
24 sie 2024
![](https://static.wixstatic.com/media/4b0b8e_2ca16f779b854c708aeb21bac6688ca8~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/4b0b8e_2ca16f779b854c708aeb21bac6688ca8~mv2.webp)
![Porównanie standardów NIST i ISO](https://static.wixstatic.com/media/4b0b8e_2ca16f779b854c708aeb21bac6688ca8~mv2.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/4b0b8e_2ca16f779b854c708aeb21bac6688ca8~mv2.webp)
The SOC 2
21 sie 2024
![](https://static.wixstatic.com/media/4b0b8e_0e5f4274e97147628d60f6e47db46741~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/4b0b8e_0e5f4274e97147628d60f6e47db46741~mv2.webp)
![Praktyczny przewodnik po audytach operacyjnych](https://static.wixstatic.com/media/4b0b8e_0e5f4274e97147628d60f6e47db46741~mv2.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/4b0b8e_0e5f4274e97147628d60f6e47db46741~mv2.webp)
The SOC 2
18 sie 2024
![](https://static.wixstatic.com/media/4b0b8e_73e767bc6a9441dd8c72a9aec172d98a~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/4b0b8e_73e767bc6a9441dd8c72a9aec172d98a~mv2.webp)
![Analiza Kryteriów Usług Zaufania SOC 2](https://static.wixstatic.com/media/4b0b8e_73e767bc6a9441dd8c72a9aec172d98a~mv2.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/4b0b8e_73e767bc6a9441dd8c72a9aec172d98a~mv2.webp)
The SOC 2
15 sie 2024
![](https://static.wixstatic.com/media/4b0b8e_6c713ad4fe8d4f079698c2a4f4570613~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/4b0b8e_6c713ad4fe8d4f079698c2a4f4570613~mv2.webp)
![Zrozumienie i wdrażanie norm ISO](https://static.wixstatic.com/media/4b0b8e_6c713ad4fe8d4f079698c2a4f4570613~mv2.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/4b0b8e_6c713ad4fe8d4f079698c2a4f4570613~mv2.webp)
The SOC 2
12 sie 2024
![](https://static.wixstatic.com/media/4b0b8e_a81abc30c28245e7bf3bbee94790d5ff~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/4b0b8e_a81abc30c28245e7bf3bbee94790d5ff~mv2.webp)
![SOC 2 oraz ISO 27001 - czym się różnią?](https://static.wixstatic.com/media/4b0b8e_a81abc30c28245e7bf3bbee94790d5ff~mv2.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/4b0b8e_a81abc30c28245e7bf3bbee94790d5ff~mv2.webp)
Sebastian Burgemejster
10 sie 2024
![](https://static.wixstatic.com/media/4b0b8e_c9de501b6996446cbab1f10eb2d7b882~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/4b0b8e_c9de501b6996446cbab1f10eb2d7b882~mv2.webp)
![Zarządzanie bezpieczeństwem informacji: podejście ISO 27001](https://static.wixstatic.com/media/4b0b8e_c9de501b6996446cbab1f10eb2d7b882~mv2.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/4b0b8e_c9de501b6996446cbab1f10eb2d7b882~mv2.webp)
The SOC 2
9 sie 2024
Kontakt
bottom of page