Reduce data compliance costs for new IT projects

Advise on reducing the costs of implementing security measures and finding a balance between the requirements of data protection and IT security officers on the one hand and stakeholders on the other

Cost reduction through targeted data compliance management in new projects

When developing new systems, I advise your IT management and your external IT service providers with the aim of reducing the costs of implementing data compliance and data security. In addition, I look for elegant solutions that fulfil the requirements of data protection and IT security officers as well as other stakeholders. In doing so, I take the budget, the available IT resources, and deadlines into account. I also support your IT team in minimising the storage and processing of sensitive data, implementing data security measures and preparing documents for auditors.

When migrating on-premise applications to a cloud provider, I participate on the negotiations to ensure that legal requirements are met and that your IT teams have all the tools they need to detect data leaks, minimise data risks and perform forensic analysis of incidents.

In the case of legacy systems, I review the code and architecture with the aim of finding ways for attackers to steal or manipulate data, of identifying inadequate protection measures and compliance risks. In the end, I propose simple and effective measures and report back to you on what I have found.

In summary, I advise you on:

  • Privacy-by-design principles for new IT projects
  • Balanced solutions for the implementation of data compliance requirements
  • Reducing the costs of data security measures
  • Preparation of documentation for auditors
  • Migration to the cloud
  • Negotiating with cloud providers to fulfill data compliance
  • Review legacy code to identify data risks
  • Analysing server landscapes to implement cost-effective data security measures
  • Mitigation of compliance risks on legacy systems
  • Preparation of documents for auditors for new and legacy systems
essential