top of page
![](https://static.wixstatic.com/media/4b0b8e_dcc7a564697b454d93386f67aa0b8d28~mv2.jpg/v1/fill/w_1920,h_1080,al_c,q_90,enc_avif,quality_auto/4b0b8e_dcc7a564697b454d93386f67aa0b8d28~mv2.jpg)
![bw_logo_pl.png](https://static.wixstatic.com/media/4b0b8e_db9d9c3c4e9b4047b90c63f25c67a736~mv2.png/v1/fill/w_184,h_42,al_c,q_85,usm_0.66_1.00_0.01,enc_avif,quality_auto/bw_logo_pl.png)
Blog
![](https://static.wixstatic.com/media/4b0b8e_97b8b990f8724380b97e25d667d1a77b~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/4b0b8e_97b8b990f8724380b97e25d667d1a77b~mv2.webp)
![SOC 2 oraz PCI DSS - czym się różnią?](https://static.wixstatic.com/media/4b0b8e_97b8b990f8724380b97e25d667d1a77b~mv2.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/4b0b8e_97b8b990f8724380b97e25d667d1a77b~mv2.webp)
Sebastian Burgemejster
6 sie 2024
![](https://static.wixstatic.com/media/4b0b8e_961c4204001a4373a650796d94640ac0~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/4b0b8e_961c4204001a4373a650796d94640ac0~mv2.webp)
![Rola audytu wewnętrznego we wzmacnianiu bezpieczeństwa łańcucha dostaw](https://static.wixstatic.com/media/4b0b8e_961c4204001a4373a650796d94640ac0~mv2.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/4b0b8e_961c4204001a4373a650796d94640ac0~mv2.webp)
Sebastian Burgemejster
3 sie 2024
![](https://static.wixstatic.com/media/4b0b8e_cf775d75e7b8467d800e7c9c3ca853da~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/4b0b8e_cf775d75e7b8467d800e7c9c3ca853da~mv2.webp)
![Najczęstsze błędy podczas przygotowywania do audytu SOC 2](https://static.wixstatic.com/media/4b0b8e_cf775d75e7b8467d800e7c9c3ca853da~mv2.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/4b0b8e_cf775d75e7b8467d800e7c9c3ca853da~mv2.webp)
Sebastian Burgemejster
31 lip 2024
![](https://static.wixstatic.com/media/4b0b8e_7a4f4f7adde84a18aecbba049da0980a~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/4b0b8e_7a4f4f7adde84a18aecbba049da0980a~mv2.webp)
![Kto potrzebuje raportu SOC 2?](https://static.wixstatic.com/media/4b0b8e_7a4f4f7adde84a18aecbba049da0980a~mv2.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/4b0b8e_7a4f4f7adde84a18aecbba049da0980a~mv2.webp)
Sebastian Burgemejster
28 lip 2024
![](https://static.wixstatic.com/media/4b0b8e_df596c359d2b40079735991b6bcc1f80~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/4b0b8e_df596c359d2b40079735991b6bcc1f80~mv2.webp)
![SOC 2 typu 1 oraz typu 2 - kluczowe różnice](https://static.wixstatic.com/media/4b0b8e_df596c359d2b40079735991b6bcc1f80~mv2.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/4b0b8e_df596c359d2b40079735991b6bcc1f80~mv2.webp)
Sebastian Burgemejster
25 lip 2024
![](https://static.wixstatic.com/media/03bf99_2e851057440d4a2a9ad08fbb56f260f7~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/03bf99_2e851057440d4a2a9ad08fbb56f260f7~mv2.webp)
![Informacja dla Audytorów i Specjalistów ds. Cyberbezpieczeństwa](https://static.wixstatic.com/media/03bf99_2e851057440d4a2a9ad08fbb56f260f7~mv2.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/03bf99_2e851057440d4a2a9ad08fbb56f260f7~mv2.webp)
kcelinska
23 lip 2024
![](https://static.wixstatic.com/media/4b0b8e_25e2777dbfaf4b62abb75626dcdb8e6b~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/4b0b8e_25e2777dbfaf4b62abb75626dcdb8e6b~mv2.webp)
![SOC 2 dla startupów - dlaczego startupy potrzebują SOC 2?](https://static.wixstatic.com/media/4b0b8e_25e2777dbfaf4b62abb75626dcdb8e6b~mv2.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/4b0b8e_25e2777dbfaf4b62abb75626dcdb8e6b~mv2.webp)
Sebastian Burgemejster
22 lip 2024
![](https://static.wixstatic.com/media/4b0b8e_104387b4175e4b2ab554a4aaf7ed48ad~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/4b0b8e_104387b4175e4b2ab554a4aaf7ed48ad~mv2.webp)
![Jak często wymagane są audyty SOC 2?](https://static.wixstatic.com/media/4b0b8e_104387b4175e4b2ab554a4aaf7ed48ad~mv2.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/4b0b8e_104387b4175e4b2ab554a4aaf7ed48ad~mv2.webp)
The SOC 2
13 lip 2024
![](https://static.wixstatic.com/media/03bf99_610a760a490045f5a4784c8e06a3301b~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/03bf99_610a760a490045f5a4784c8e06a3301b~mv2.webp)
![Zrozumienie danych syntetycznych: Zwiększenie prywatności i użyteczności](https://static.wixstatic.com/media/03bf99_610a760a490045f5a4784c8e06a3301b~mv2.webp/v1/fill/w_292,h_292,al_c,q_90,enc_auto/03bf99_610a760a490045f5a4784c8e06a3301b~mv2.webp)
kcelinska
17 cze 2024
![](https://static.wixstatic.com/media/03bf99_1697e04403ea47109c7ee7fcb9cb64e7~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/03bf99_1697e04403ea47109c7ee7fcb9cb64e7~mv2.webp)
![Ujawnione dane uwierzytelniające w usłudze Postman: Co powinniśmy wiedzieć?](https://static.wixstatic.com/media/03bf99_1697e04403ea47109c7ee7fcb9cb64e7~mv2.webp/v1/fill/w_292,h_292,al_c,q_90,enc_auto/03bf99_1697e04403ea47109c7ee7fcb9cb64e7~mv2.webp)
kcelinska
5 cze 2024
![](https://static.wixstatic.com/media/03bf99_b296e8aa7d9a4db28f686be379de7898~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/03bf99_b296e8aa7d9a4db28f686be379de7898~mv2.webp)
![OECD aktualizuje zasady dotyczące sztucznej inteligencji](https://static.wixstatic.com/media/03bf99_b296e8aa7d9a4db28f686be379de7898~mv2.webp/v1/fill/w_292,h_292,al_c,q_90,enc_auto/03bf99_b296e8aa7d9a4db28f686be379de7898~mv2.webp)
kcelinska
27 maj 2024
![](https://static.wixstatic.com/media/03bf99_af7ad0b7e6114b87a58cba3d16b46344~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/03bf99_af7ad0b7e6114b87a58cba3d16b46344~mv2.webp)
![FRC nałożyła surowe sankcje na firmy audytorskie za błędy w audycie LCF](https://static.wixstatic.com/media/03bf99_af7ad0b7e6114b87a58cba3d16b46344~mv2.webp/v1/fill/w_292,h_292,al_c,q_90,enc_auto/03bf99_af7ad0b7e6114b87a58cba3d16b46344~mv2.webp)
kcelinska
20 maj 2024
![](https://static.wixstatic.com/media/03bf99_8997bacea950485f8d22b4f9e1063ac7~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/03bf99_8997bacea950485f8d22b4f9e1063ac7~mv2.webp)
![Amerykańska sieć szpitali Ascension to kolejna duża ofiara ataku ransomware](https://static.wixstatic.com/media/03bf99_8997bacea950485f8d22b4f9e1063ac7~mv2.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/03bf99_8997bacea950485f8d22b4f9e1063ac7~mv2.webp)
kcelinska
15 maj 2024
![](https://static.wixstatic.com/media/03bf99_70a54f82cbaf45439f4d117c5e0b0d16~mv2.webp/v1/fill/w_250,h_250,al_c,q_30,blur_30,enc_auto/03bf99_70a54f82cbaf45439f4d117c5e0b0d16~mv2.webp)
![Nowości w standardach AI!](https://static.wixstatic.com/media/03bf99_70a54f82cbaf45439f4d117c5e0b0d16~mv2.webp/v1/fill/w_292,h_292,al_c,q_90,enc_auto/03bf99_70a54f82cbaf45439f4d117c5e0b0d16~mv2.webp)
kcelinska
13 maj 2024
![](https://static.wixstatic.com/media/feac4ac6367d4ef981204947f25830a5.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/feac4ac6367d4ef981204947f25830a5.webp)
![Audytor na godziny](https://static.wixstatic.com/media/feac4ac6367d4ef981204947f25830a5.jpg/v1/fill/w_292,h_292,fp_0.50_0.50,q_90,enc_auto/feac4ac6367d4ef981204947f25830a5.webp)
Sebastian Burgemejster
2 gru 2020
Kontakt
bottom of page