{"id":7895,"date":"2021-06-10T10:59:56","date_gmt":"2021-06-10T08:59:56","guid":{"rendered":"https:\/\/www.ensec.ch\/it-security-beratung\/grc\/"},"modified":"2025-01-27T16:08:26","modified_gmt":"2025-01-27T15:08:26","slug":"grc","status":"publish","type":"page","link":"https:\/\/www.ensec.ch\/en\/it-security-beratung\/grc\/","title":{"rendered":"GRC"},"content":{"rendered":"<h1>Governance, Risk &#038; Compliance (GRC)<\/h1>\n<div>\n<p><script src=\"https:\/\/cdn.lordicon.com\/libs\/frhvbuzj\/lord-icon-2.0.2.js\"><\/script> <lord-icon src=\"https:\/\/cdn.lordicon.com\/zpxybbhl.json\" trigger=\"loop\" colors=\"primary:#54BBAB,secondary:#007EA7\" stroke=\"35\" style=\"width: 90px; height: 90px;\"> <\/lord-icon><\/p>\n<\/div>\n<div>\n<h2>Our IT security experts will be happy to advise you.<\/h2>\n<p><a href=\"\/ensec\/kontakt\/\">Call now<\/a><\/p>\n<\/div>\n<hr>\n<h2>GRC combines the management of the company (governance), risk management (risk) and compliance into one discipline. Our services in this area range from corresponding analyses to the development of management systems and awareness training.<\/h2>\n<div>Our IT security consulting for your business<\/div>\n<ul>\n<li>\n        <a href=\"\/ensec\/en\/it-security-beratung\/security-strategie\/\">Security Strategy<\/a>\n    <\/li>\n<li>\n        <a href=\"\">GRC<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/en\/it-security-beratung\/security-architektur\/\">Security Architecture<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/en\/it-security-beratung\/security-awareness\/\">Security Awareness<\/a>\n    <\/li>\n<li>\n        <a href=\"\/ensec\/en\/it-security-beratung\/technologieberatung\/\">Technology consulting<\/a>\n    <\/li>\n<\/ul>\n<hr>\n<h2>Navigating risky shoals in a controlled manner.<\/h2>\n<div>\n<p>GRC is like a ship&#8217;s GPS. It shows the route according to clearly defined guidelines. However, GRC is far from being professionally established in all companies. Anyone responsible for a company&#8217;s IT, IT security or IT compliance nowadays is usually confronted with incomplete knowledge and incomplete or even missing plans. This is precisely where professional GRC comes in: While risk management creates transparency with regard to a company&#8217;s risks and weak points, governance ensures active management of the company&#8217;s IT in line with the defined strategy and compliance ensures verifiable adherence to external and internal requirements.<\/p>\n<\/div>\n<h3>Governance<\/h3>\n<div>\n<p>Corporate IT is managed on several levels. Directives (policies) provide the framework, processes and guidelines serve as instructions for day-to-day work, superiors and colleagues set an example, give instructions and shape the corporate culture to which employees orientate themselves. The interaction of all these and other components ultimately defines the direction in which the company moves. The system and its interactions are complex. However, the reasons why management fails are much simpler: missing or incorrect objectives and targets as well as a lack of controls and measuring points.<\/p>\n<\/div>\n<h3>Risk Management<\/h3>\n<div>\n<p>Active and well-integrated risk management is a valuable and effective means of supporting the governance and achievement of the company&#8217;s objectives. It is an indispensable basis for effective information security and therefore for protecting the company&#8217;s assets. In the IT sector in particular, it is important to combine different means of identifying and analysing risks in order to gain as complete and up-to-date a picture as possible of the risk situation and to be able to derive and implement effective measures based on this.<\/p>\n<\/div>\n<h3>Compliance<\/h3>\n<div>\n<p>One of the main challenges in the area of compliance is to record all applicable regulations. However, adapting these regulations to your own company can also be challenging. In addition to fines and other (official) measures, breaches can also result in reputational damage. To prevent such negative effects, a company must understand the regulations, be able to assess the measures taken to implement them and be aware of the associated residual risk. In particular, rapidly developing, comprehensive areas of law such as data protection present companies with constant challenges.<\/p>\n<\/div>\n<h3>Data protection<\/h3>\n<div>\n<p>Data protection has become increasingly important in the digital world and presents companies with the challenge of protecting the privacy of their customers and employees. Compliance with the European General Data Protection Regulation (GDPR) and the revised Swiss Data Protection Act (revDSG) is a key component of a successful governance and compliance strategy. Companies must systematically review their handling of personal data in order to minimise risks and meet legal requirements. This includes the introduction of data protection guidelines, the implementation of technical and organisational security measures and the continuous monitoring and improvement of data protection processes.<\/p>\n<p>Effective collaboration between IT, Risk Management and Legal &amp; Compliance is crucial to ensure a comprehensive understanding of data protection requirements and to take appropriate measures to ensure compliance with these requirements.<\/p>\n<p>Data protection officers or data protection consultants support companies in identifying risks, implementing data protection measures and continuously monitoring the effectiveness of these measures to ensure compliance with legal requirements and avoid reputational damage.<\/p>\n<\/div>\n<div>\n<p>        <img decoding=\"async\" src=\"\/wp-content\/uploads\/2021\/11\/it-security_04.jpg\" alt=\"\"><\/p>\n<h2>GRC: essential for achieving corporate goals<\/h2>\n<p>From a business perspective<\/p>\n<div>\n<p>Companies need secure, stable and legally compliant structures and processes in order to achieve their business goals. This is not only analogue, but &#8211; increasingly important &#8211; also digital. From legal certainty in data processing to the protection of company assets from hackers, malware and disgruntled or careless employees: GRC creates the necessary conditions for compliant and smooth business operations.<\/p>\n<p>Other positive effects: Increased customer confidence, optimised processes, improved resource allocation and managers who can sleep soundly in the knowledge that they have done their job well.<\/p>\n<\/div>\n<p><a href=\"#8\"><\/a><\/p>\n<\/div>\n<h2>\n<p>May we personally provide you with arguments in favour of ensec? Please contact us.<\/p>\n<\/h2>\n<p><p>\n        <a href=\"mailto:hello@ensec.ch\">Write to us<\/a>\n    <\/p>\n<\/p>\n<div>\n<p>Or give us a call:<\/p>\n<\/div>\n<h3><a href=\"tel:+41447111144 \">+41 44 711 11 44<\/a><\/h3>\n<p><!--more--><br \/>\n<!-- {\"name\":\"Home\",\"type\":\"layout\",\"children\":[{\"type\":\"section\",\"props\":{\"animation\":\"slide-bottom-medium\",\"animation_delay\":\"120\",\"css\":\".el-section {\\n\\tbackground-image: url('https:\\\/\\\/www.ensec.ch\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/ensec-hintergrund_animation.svg'), url('https:\\\/\\\/www.ensec.ch\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/background_seamap-03.png');\\n  background-repeat: no-repeat, no-repeat;\\n  background-position: center, center;\\n  background-size: cover, cover;\\n}\",\"header_transparent_noplaceholder\":true,\"id\":\"top\",\"image_position\":\"top-center\",\"image_size\":\"cover\",\"media_background\":\"#007EA7\",\"media_overlay\":\"rgba(0, 0, 0, 0.1)\",\"padding\":\"large\",\"padding_remove_bottom\":false,\"style\":\"muted\",\"text_color\":\"light\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"video_width\":\"2560\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"props\":{\"layout\":\"2-3,1-3\",\"margin\":\"remove-vertical\"},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Governance, Risk & Compliance (GRC)\",\"margin\":\"small\",\"margin_remove_top\":true,\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"s\",\"text_align_fallback\":\"center\",\"title_color\":\"success\",\"title_element\":\"h1\",\"title_style\":\"heading-large\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"vertical_align\":\"bottom\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"text\",\"props\":{\"block_align\":\"center\",\"column_breakpoint\":\"m\",\"content\":\"\n\n<p><script src=\\\"https:\\\/\\\/cdn.lordicon.com\\\/libs\\\/frhvbuzj\\\/lord-icon-2.0.2.js\\\"><\\\/script> <lord-icon src=\\\"https:\\\/\\\/cdn.lordicon.com\\\/zpxybbhl.json\\\" trigger=\\\"loop\\\" colors=\\\"primary:#54BBAB,secondary:#007EA7\\\" stroke=\\\"35\\\" style=\\\"width: 90px; height: 90px;\\\"> <\\\/lord-icon><\\\/p>\",\"css\":\".el-element {\\n\\twidth: 120px;\\n    padding: 15px;\\n    border-radius: 50%;\\n    background-color:#fff;\\n    box-shadow: rgba(50, 50, 93, 0.25) 0px 50px 100px -20px, rgba(0, 0, 0, 0.3) 0px 30px 60px -30px;\\n}\",\"margin\":\"default\",\"margin_remove_top\":false,\"maxwidth\":\"medium\",\"position\":\"relative\",\"position_top\":\"55\",\"position_z_index\":\"1\",\"text_align\":\"center\"}},{\"type\":\"grid\",\"props\":{\"animation\":\"fade\",\"content_column_breakpoint\":\"m\",\"css\":\".el-title {\\n\\tpadding-top:10px;\\n}\\n\\n.el-item > * {\\n\\tborder-radius:15px;\\n    box-shadow: rgba(0, 0, 0, 0.16) 0px 10px 36px 0px, rgba(0, 0, 0, 0.06) 0px 0px 0px 1px;\\n}\\n\\n.el-item > *:hover {\\n    box-shadow: rgba(0, 0, 0, 0.56) 0px 22px 70px 4px;\\n}\\n\\n.el-item > *:hover .el-link { \\n\\tbackground-color: #003249;\\n\\tborder: solid 1px #003249;\\n\\tcolor: #fff;\\n\\tbox-shadow: rgba(0, 0, 0, 0.25) 0px 54px 55px, rgba(0, 0, 0, 0.12) 0px -12px 30px, rgba(0, 0, 0, 0.12) 0px 4px 6px, rgba(0, 0, 0, 0.17) 0px 12px 13px, rgba(0, 0, 0, 0.09) 0px -3px 5px;\\n}\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_column_align\":true,\"grid_default\":\"1\",\"grid_medium\":\"\",\"grid_row_align\":false,\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":false,\"image_svg_color\":\"emphasis\",\"image_svg_inline\":true,\"image_width\":\"80\",\"item_animation\":true,\"item_maxwidth\":\"large\",\"lightbox_bg_close\":true,\"link_margin\":\"medium\",\"link_style\":\"primary\",\"link_text\":\"Read More\",\"margin\":\"default\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_link\":true,\"panel_link_hover\":\"true\",\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"parallax_easing\":\"1\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"text_align\":\"center\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"\",\"link\":\"kontakt\\\/\",\"link_text\":\"Call now\",\"title\":\"Our IT security experts will be happy to advise you.\"}}]}]}]}],\"name\":\"Hero \\u2013\\u00a0Level 2 \\\/\\\/ CTA - animiert\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"150\",\"css\":\".el-section {\\n\\tpadding-bottom:60px;\\n}\",\"id\":\"pricelist\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-04.svg\",\"image_position\":\"top-left\",\"image_size\":\"width-1-1\",\"image_width\":\"992\",\"media_overlay\":\"rgba(255, 255, 255, 0.48)\",\"padding\":\"small\",\"padding_remove_bottom\":true,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"breadcrumbs\",\"props\":{\"show_current\":true,\"show_home\":true}},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"margin\":\"medium\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}],\"props\":{\"layout\":\"3-4,1-4\"}},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"medium\",\"margin_remove_bottom\":true,\"margin_remove_top\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"GRC combines the management of the company (governance), risk management (risk) and compliance into one discipline. Our services in this area range from corresponding analyses to the development of management systems and awareness training.\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h2\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"large\",\"margin_remove_top\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Our IT security consulting for your business\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"div\",\"title_style\":\"h5\"}},{\"type\":\"subnav\",\"props\":{\"css\":\"@media only screen and (max-width: 600px) {\\n  a.el-content, a.el-link {\\n  padding:10px 20px;\\n  }\\n}\\n\\n.el-link {\\n  padding: 20px 40px;\\n  border: solid 1px #007ea7;\\n  background-color: #fff;\\n  color: #007ea7;\\n}\\n\\n.el-link:hover { \\n  background-color: #003249;\\n  border: solid 1px #003249;\\n  color: #fff;\\n}\\n\\n.el-content {\\n  padding: 20px 40px;\\n  border: solid 1px #007ea7;\\n  background-color: #007ea7;\\n  color: #fff;\\n}\",\"subnav_style\":\"pill\"},\"children\":[{\"type\":\"subnav_item\",\"props\":{\"content\":\"Security Strategy\",\"link\":\"en\\\/it-security-beratung\\\/security-strategie\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"GRC\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Security Architecture\",\"link\":\"en\\\/it-security-beratung\\\/security-architektur\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Security Awareness\",\"link\":\"en\\\/it-security-beratung\\\/security-awareness\\\/\"}},{\"type\":\"subnav_item\",\"props\":{\"content\":\"Technology consulting\",\"link\":\"en\\\/it-security-beratung\\\/technologieberatung\\\/\"}}],\"modified\":\"2021-05-11T13:39:40.496Z\",\"name\":\"Subnav \\u2013 IT Security\"},{\"type\":\"divider\",\"props\":{\"divider_element\":\"hr\",\"margin\":\"medium\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"remove-vertical\",\"margin_remove_top\":true},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Navigating risky shoals in a controlled manner.\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h2\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>GRC is like a ship's GPS. It shows the route according to clearly defined guidelines. However, GRC is far from being professionally established in all companies. Anyone responsible for a company's IT, IT security or IT compliance nowadays is usually confronted with incomplete knowledge and incomplete or even missing plans. This is precisely where professional GRC comes in: While risk management creates transparency with regard to a company's risks and weak points, governance ensures active management of the company's IT in line with the defined strategy and compliance ensures verifiable adherence to external and internal requirements.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\",\"text_color\":\"primary\",\"text_style\":\"large\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"},\"children\":[{\"type\":\"grid\",\"props\":{\"animation\":\"fade\",\"content_column_breakpoint\":\"m\",\"css\":\".el-title {\\n\\tpadding-top:10px;\\n}\\n\\n.el-item > * {\\n\\tborder-radius:15px;\\n    box-shadow: rgba(0, 0, 0, 0.16) 0px 10px 36px 0px, rgba(0, 0, 0, 0.06) 0px 0px 0px 1px;\\n}\\n\\n.el-item > *:hover {\\n    box-shadow: rgba(0, 0, 0, 0.56) 0px 22px 70px 4px;\\n}\\n\\n.el-item > *:hover .el-link { \\n\\tbackground-color: #003249;\\n\\tborder: solid 1px #003249;\\n\\tcolor: #fff;\\n\\tbox-shadow: rgba(0, 0, 0, 0.25) 0px 54px 55px, rgba(0, 0, 0, 0.12) 0px -12px 30px, rgba(0, 0, 0, 0.12) 0px 4px 6px, rgba(0, 0, 0, 0.17) 0px 12px 13px, rgba(0, 0, 0, 0.09) 0px -3px 5px;\\n}\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_column_align\":true,\"grid_default\":\"1\",\"grid_medium\":\"\",\"grid_row_align\":false,\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":false,\"image_svg_color\":\"emphasis\",\"image_svg_inline\":true,\"image_width\":\"80\",\"item_animation\":true,\"item_maxwidth\":\"large\",\"lightbox_bg_close\":true,\"link_margin\":\"medium\",\"link_style\":\"primary\",\"link_text\":\"Read More\",\"margin\":\"default\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_link\":true,\"panel_link_hover\":\"true\",\"panel_padding\":\"default\",\"panel_style\":\"card-primary\",\"parallax_easing\":\"1\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"status\":\"disabled\",\"text_align\":\"center\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"visibility\":\"m\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\",\"image\":\"\",\"link\":\"kontakt\\\/\",\"link_text\":\"Jetzt downloaden\",\"title\":\"Security Strategie Whitepaper\"}}],\"modified\":\"2021-11-12T08:41:29.016Z\",\"name\":\"Factsheet Button\"}]}]},{\"type\":\"row\",\"props\":{\"layout\":\"3-4,1-4\",\"margin\":\"medium\",\"margin_remove_top\":false},\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"preserve_color\":false,\"width_medium\":\"3-4\"},\"children\":[{\"type\":\"headline\",\"props\":{\"content\":\"Governance\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Corporate IT is managed on several levels. Directives (policies) provide the framework, processes and guidelines serve as instructions for day-to-day work, superiors and colleagues set an example, give instructions and shape the corporate culture to which employees orientate themselves. The interaction of all these and other components ultimately defines the direction in which the company moves. The system and its interactions are complex. However, the reasons why management fails are much simpler: missing or incorrect objectives and targets as well as a lack of controls and measuring points.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\"}},{\"type\":\"headline\",\"props\":{\"content\":\"Risk Management\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Active and well-integrated risk management is a valuable and effective means of supporting the governance and achievement of the company's objectives. It is an indispensable basis for effective information security and therefore for protecting the company's assets. In the IT sector in particular, it is important to combine different means of identifying and analysing risks in order to gain as complete and up-to-date a picture as possible of the risk situation and to be able to derive and implement effective measures based on this.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\"}},{\"type\":\"headline\",\"props\":{\"content\":\"Compliance\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>One of the main challenges in the area of compliance is to record all applicable regulations. However, adapting these regulations to your own company can also be challenging. In addition to fines and other (official) measures, breaches can also result in reputational damage. To prevent such negative effects, a company must understand the regulations, be able to assess the measures taken to implement them and be aware of the associated residual risk. In particular, rapidly developing, comprehensive areas of law such as data protection present companies with constant challenges.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\"}},{\"type\":\"headline\",\"props\":{\"content\":\"Data protection\",\"margin\":\"medium\",\"margin_remove_top\":false,\"title_element\":\"h3\"}},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Data protection has become increasingly important in the digital world and presents companies with the challenge of protecting the privacy of their customers and employees. Compliance with the European General Data Protection Regulation (GDPR) and the revised Swiss Data Protection Act (revDSG) is a key component of a successful governance and compliance strategy. Companies must systematically review their handling of personal data in order to minimise risks and meet legal requirements. This includes the introduction of data protection guidelines, the implementation of technical and organisational security measures and the continuous monitoring and improvement of data protection processes.<\\\/p>\\n\n\n<p>Effective collaboration between IT, Risk Management and Legal &amp; Compliance is crucial to ensure a comprehensive understanding of data protection requirements and to take appropriate measures to ensure compliance with these requirements.<\\\/p>\\n\n\n<p>Data protection officers or data protection consultants support companies in identifying risks, implementing data protection measures and continuously monitoring the effectiveness of these measures to ensure compliance with legal requirements and avoid reputational damage.<\\\/p>\",\"margin\":\"default\",\"maxwidth\":\"2xlarge\"}}]},{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-4\"}}]}],\"name\":\"Content \\u2013 Level 2\",\"modified\":\"2021-05-11T13:23:47.505Z\"},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"animation_delay\":\"150\",\"css\":\".el-section {\\n\\tpadding-bottom:60px;\\n}\",\"id\":\"pricelist\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-04.svg\",\"image_position\":\"top-left\",\"image_size\":\"width-1-1\",\"image_width\":\"992\",\"media_overlay\":\"rgba(255, 255, 255, 0.48)\",\"padding\":\"small\",\"padding_remove_bottom\":true,\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"top-center\",\"image_size\":\"contain\",\"position_sticky_breakpoint\":\"m\"},\"children\":[{\"type\":\"panel\",\"props\":{\"animation\":\"none\",\"content\":\"\n\n<p>Companies need secure, stable and legally compliant structures and processes in order to achieve their business goals. This is not only analogue, but - increasingly important - also digital. From legal certainty in data processing to the protection of company assets from hackers, malware and disgruntled or careless employees: GRC creates the necessary conditions for compliant and smooth business operations.<\\\/p>\\n\n\n<p>Other positive effects: Increased customer confidence, optimised processes, improved resource allocation and managers who can sleep soundly in the knowledge that they have done their job well.<\\\/p>\",\"content_column_breakpoint\":\"m\",\"content_margin\":\"medium\",\"icon_width\":80,\"image\":\"wp-content\\\/uploads\\\/2021\\\/11\\\/it-security_04.jpg\",\"image_align\":\"right\",\"image_grid_breakpoint\":\"m\",\"image_grid_column_gap\":\"large\",\"image_grid_width\":\"3-5\",\"image_height\":\"780\",\"image_link\":true,\"image_svg_color\":\"emphasis\",\"image_vertical_align\":true,\"image_width\":\"910\",\"link\":\"#8\",\"link_style\":\"text\",\"link_text\":\"\",\"margin\":\"large\",\"margin_remove_top\":false,\"meta\":\"From a business perspective\",\"meta_align\":\"above-title\",\"meta_element\":\"div\",\"meta_margin\":\"small\",\"meta_style\":\"h4\",\"panel_padding\":\"large\",\"panel_style\":\"card-primary\",\"parallax_breakpoint\":\"l\",\"parallax_x\":\"220,0\",\"title\":\"GRC: essential for achieving corporate goals\",\"title_align\":\"top\",\"title_element\":\"h2\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_link\":false,\"title_margin\":\"small\",\"title_style\":\"h2\"}}]}]}],\"name\":\"Aus Sicht des Business\",\"modified\":\"2021-05-11T13:23:47.505Z\"},{\"name\":\"Services\",\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"id\":\"services\",\"image\":\"wp-content\\\/uploads\\\/2021\\\/05\\\/seekarte_hintergrund-05.svg\",\"image_position\":\"center-center\",\"image_size\":\"cover\",\"padding\":\"small\",\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"image_position\":\"center-center\",\"position_sticky_breakpoint\":\"m\",\"width_medium\":\"1-1\"},\"children\":[{\"type\":\"grid\",\"props\":{\"animation\":\"none\",\"content_column_breakpoint\":\"m\",\"css\":\".el-item > *:hover {\\n\\tbox-shadow: rgba(0, 0, 0, 0.56) 0px 22px 70px 4px;\\n}\",\"filter_align\":\"left\",\"filter_all\":true,\"filter_grid_breakpoint\":\"m\",\"filter_grid_width\":\"auto\",\"filter_position\":\"top\",\"filter_style\":\"tab\",\"grid_default\":\"1\",\"grid_large\":\"4\",\"grid_medium\":\"\",\"grid_parallax\":\"0\",\"grid_small\":\"2\",\"icon_width\":80,\"image_align\":\"top\",\"image_grid_breakpoint\":\"m\",\"image_grid_width\":\"1-2\",\"image_svg_animate\":true,\"image_svg_color\":\"primary\",\"image_svg_inline\":true,\"item_animation\":true,\"item_maxwidth\":\"xlarge\",\"lightbox_bg_close\":true,\"link_style\":\"text\",\"link_text\":\"Mehr erfahren\",\"margin\":\"\",\"meta_align\":\"below-title\",\"meta_element\":\"div\",\"meta_style\":\"text-meta\",\"panel_link\":true,\"panel_link_hover\":\"true\",\"panel_padding\":\"default\",\"panel_style\":\"card-default\",\"parallax_breakpoint\":\"m\",\"parallax_easing\":\"1\",\"parallax_y\":\"0,-80\",\"show_content\":true,\"show_hover_image\":true,\"show_hover_video\":true,\"show_image\":true,\"show_link\":true,\"show_meta\":true,\"show_title\":true,\"show_video\":true,\"status\":\"disabled\",\"title_align\":\"top\",\"title_element\":\"h3\",\"title_grid_breakpoint\":\"m\",\"title_grid_width\":\"1-2\",\"title_hover_style\":\"reset\",\"title_style\":\"h2\"},\"children\":[{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Security Governance schafft Voraussetzungen und einen Ordnungsrahmen f\\u00fcr eine optimale Unterst\\u00fctzung der Unternehmensziele. Was es zu beachten gilt.<\\\/p>\",\"image\":\"\",\"title\":\"Security Governance\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Die Informationssicherheit f\\u00fcr Unternehmen wird immer wichtiger. Ein Information Security Management System bietet Schutz. So sollte es ausgestaltet sein.<\\\/p>\",\"image\":\"\",\"title\":\"Information Security Management\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Business Continuity Management stellt sicher, dass kritische Gesch\\u00e4ftsprozesse und -Daten auch in Notsituationen verf\\u00fcgbar bleiben. Was das f\\u00fcr die IT heisst.<\\\/p>\",\"image\":\"\",\"title\":\"Business Continuity Management\"}},{\"type\":\"grid_item\",\"props\":{\"content\":\"\n\n<p>Die rechtlichen und regulatorischen Pflichten stellen im IT-Umfeld eine wesentliche Teilmenge aller Compliance-Anforderungen dar. Das m\\u00fcssen CIOs und CCOs wissen.<\\\/p>\",\"image\":\"\",\"title\":\"IT Compliance & Datenschutz\"}}]}]}],\"props\":{\"width\":\"expand\"}}]},{\"type\":\"section\",\"props\":{\"animation\":\"fade\",\"image_position\":\"center-center\",\"padding\":\"large\",\"padding_remove_top\":false,\"style\":\"default\",\"title_breakpoint\":\"xl\",\"title_position\":\"top-left\",\"title_rotation\":\"left\",\"vertical_align\":\"\",\"width\":\"large\"},\"children\":[{\"type\":\"row\",\"children\":[{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-top: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 0 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-left: 2px solid #007ea7;\\n\\tborder-right: 0px solid #fff;\\n    padding: 0 0 0 50px;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"large\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"2-3\"},\"children\":[{\"type\":\"headline\",\"props\":{\"block_align_breakpoint\":\"m\",\"block_align_fallback\":\"center\",\"content\":\"\n\n<p>May we personally provide you with arguments in favour of ensec? Please contact us.<\\\/p>\",\"maxwidth\":\"2xlarge\",\"text_align\":\"left\",\"text_align_breakpoint\":\"m\",\"text_align_fallback\":\"center\",\"title_element\":\"h2\"}}]},{\"type\":\"column\",\"props\":{\"css\":\".el-column {\\n\\tborder-left: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n    padding: 0 0 50px 0;\\n}\\n\\n\\\/** Gr\\u00f6\\u00dfere Monitore **\\\/\\n@media only screen and (min-width: 960px) {\\n    .el-column { \\n\\tborder-top: 2px solid #007ea7;\\n    border-bottom: 2px solid #007ea7;\\n    border-right: 2px solid #007ea7;\\n \\tborder-left: 0px solid #fff;\\n    padding: 0 50px 0 0;\\n    }\\n}\",\"image_position\":\"center-center\",\"padding\":\"none\",\"position_sticky_breakpoint\":\"m\",\"style\":\"tile-default\",\"vertical_align\":\"middle\",\"width_medium\":\"1-3\"},\"children\":[{\"type\":\"button\",\"props\":{\"button_size\":\"large\",\"css\":\".el-content {\\n\\tfont-size: 1.3rem;\\n    padding: 15px 40px;\\n    text-transform: uppercase;\\n}\\n\\n.el-content:hover { \\n  background-color: #003249;\\n  border: solid 1px #003249;\\n  color: #fff;\\n}\",\"grid_column_gap\":\"small\",\"grid_row_gap\":\"small\",\"margin\":\"default\",\"text_align\":\"center\"},\"children\":[{\"type\":\"button_item\",\"props\":{\"button_style\":\"primary\",\"content\":\"Write to us\",\"dialog_layout\":\"modal\",\"dialog_offcanvas_flip\":true,\"icon_align\":\"left\",\"link\":\"mailto:hello@ensec.ch\"}}]},{\"type\":\"text\",\"props\":{\"column_breakpoint\":\"m\",\"content\":\"\n\n<p>Or give us a call:<\\\/p>\",\"margin\":\"default\",\"margin_remove_bottom\":true,\"text_align\":\"center\"}},{\"type\":\"headline\",\"props\":{\"content\":\"+41 44 711 11 44\",\"link\":\"tel:+41447111144 \",\"margin_remove_top\":true,\"text_align\":\"center\",\"title_element\":\"h3\"}}]}],\"props\":{\"column_gap\":\"collapse\",\"layout\":\"2-3,1-3\",\"row_gap\":\"collapse\"}}],\"name\":\"Call to Action\",\"modified\":\"2021-02-09T15:59:25.850Z\"}],\"version\":\"4.5.1\"} --><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Governance, Risk &#038; Compliance (GRC) Our IT security experts will be happy to advise you. Call now GRC combines the management of the company (governance), risk management (risk) and compliance into one discipline. Our services in this area range from corresponding analyses to the development of management systems and awareness training. Our IT security consulting [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":7868,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-7895","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7895","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/comments?post=7895"}],"version-history":[{"count":8,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7895\/revisions"}],"predecessor-version":[{"id":8273,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7895\/revisions\/8273"}],"up":[{"embeddable":true,"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/pages\/7868"}],"wp:attachment":[{"href":"https:\/\/www.ensec.ch\/en\/wp-json\/wp\/v2\/media?parent=7895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}