{"id":2727,"date":"2023-12-20T13:54:35","date_gmt":"2023-12-20T13:54:35","guid":{"rendered":"https:\/\/cyber-curriculum.com\/?page_id=2727"},"modified":"2024-04-22T06:28:41","modified_gmt":"2024-04-22T06:28:41","slug":"data-protection-audit","status":"publish","type":"page","link":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/data-protection-audit\/","title":{"rendered":"Data protection audit"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:120px;--awb-background-image:linear-gradient(180deg, rgba(35,199,172,0.44) 0%,rgba(255,255,255,0) 100%);--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1 sm-text-align-center fusion-text-no-margin\" style=\"--awb-margin-bottom:0px;\"><p><span style=\"color: rgb(255, 255, 255);\">Data protection without wasting time<\/span><\/p>\n<\/div><div class=\"fusion-title title fusion-title-1 fusion-no-small-visibility fusion-sep-none fusion-title-text fusion-title-size-three gradient-text\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:35;line-height:var(--awb-typography1-line-height);\">Your data protection quick check<\/h3><\/div><div class=\"fusion-title title fusion-title-2 fusion-no-medium-visibility fusion-no-large-visibility fusion-sep-none fusion-title-text fusion-title-size-four gradient-text\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">QUICK DATA PROTECTION AUDIT<\/h4><\/div><div class=\"fusion-text fusion-text-2 sm-text-align-center\" style=\"--awb-text-color:#ffffff;\"><p>With the help of our digital data protection audit and the expertise of our data protection experts, potential data protection problems can be uncovered and your company effectively protected.  <\/p>\n<\/div><ul style=\"--awb-margin-bottom:30px;--awb-iconcolor:var(--awb-color4);--awb-line-height:27.2px;--awb-icon-width:27.2px;--awb-icon-height:27.2px;--awb-icon-margin:11.2px;--awb-content-margin:38.4px;\" class=\"fusion-checklist fusion-checklist-1 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Quick check of your company&#8217;s GDPR compliance<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Free availability of fully qualified lawyers around the clock<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Comprehensive support in all data protection-related matters, including documentation and more<\/p>\n<\/div><\/li><\/ul><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion-flex-column fusion-flex-align-self-stretch fusion-no-small-visibility\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-row fusion-flex-align-items-center\"><div class=\"fusion-image-element \" style=\"--awb-max-width:380px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"2000\" height=\"2000\" title=\"Hero-Datenschutz-Audit-Full\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Hero-Datenschutz-Audit-Full.png\" alt class=\"img-responsive wp-image-2657\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Hero-Datenschutz-Audit-Full-200x200.png 200w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Hero-Datenschutz-Audit-Full-400x400.png 400w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Hero-Datenschutz-Audit-Full-600x600.png 600w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Hero-Datenschutz-Audit-Full-800x800.png 800w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Hero-Datenschutz-Audit-Full-1200x1200.png 1200w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Hero-Datenschutz-Audit-Full.png 2000w\" sizes=\"(max-width: 640px) 100vw, 2000px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:80px;--awb-padding-bottom:0px;--awb-padding-top-medium:51px;--awb-padding-top-small:30px;--awb-padding-bottom-small:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-stretch fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-bottom:30px;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:80px;--awb-spacing-right-large:9.6%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:9.6%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:9.6%;--awb-spacing-left-medium:9.6%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3 fusion-no-small-visibility fusion-text-no-margin\" style=\"--awb-content-alignment:center;--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;\"><p style=\"font-size: 18px;\" data-fusion-font=\"true\">The perfect data protection solution for your company<\/p>\n<\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:35;line-height:var(--awb-typography1-line-height);\">Clarity about your benefits &#8211; our data protection audit<\/h3><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:80px;--awb-padding-left-medium:31px;--awb-padding-top-small:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-stretch fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion-flex-column fusion-animated borderhover2 equali\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-padding-top-medium:20px;--awb-padding-right-medium:20px;--awb-padding-bottom-medium:20px;--awb-padding-left-medium:20px;--awb-overflow:hidden;--awb-bg-color:#1c1c1c;--awb-bg-color-hover:#1c1c1c;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:28%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:28%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"2\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:50px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"64\" height=\"64\" title=\"support_agent_FILL1_wght100_GRAD0_opsz24 1\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/support_agent_FILL1_wght100_GRAD0_opsz24-1.png\" alt class=\"img-responsive wp-image-2538\"\/><\/span><\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-five\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h5 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:20;--minFontSize:20;line-height:var(--awb-typography1-line-height);\">Personal support<br \/>\nthroughout Germany<\/h5><\/div><div class=\"fusion-text fusion-text-4\" style=\"--awb-content-alignment:center;--awb-margin-top:10px;\"><p style=\"color: #ffffff; text-align: left;\">Our external data protection officers have extensive experience as experienced lawyers and industry experts who have been supporting companies of all sizes for many years.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion-flex-column fusion-animated borderhover2 equali\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-padding-top-medium:20px;--awb-padding-right-medium:20px;--awb-padding-bottom-medium:20px;--awb-padding-left-medium:20px;--awb-overflow:hidden;--awb-bg-color:#1c1c1c;--awb-bg-color-hover:#1c1c1c;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:28%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:28%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"2\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:50px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\"><img decoding=\"async\" width=\"68\" height=\"68\" title=\"verified_user_FILL1_wght100_GRAD0_opsz24 1\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/verified_user_FILL1_wght100_GRAD0_opsz24-1.png\" alt class=\"img-responsive wp-image-2539\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/verified_user_FILL1_wght100_GRAD0_opsz24-1-66x66.png 66w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/verified_user_FILL1_wght100_GRAD0_opsz24-1.png 68w\" sizes=\"(max-width: 68px) 100vw, 68px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-five\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h5 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:20;--minFontSize:20;line-height:var(--awb-typography1-line-height);\">Individual &amp; transparent offers<\/h5><\/div><div class=\"fusion-text fusion-text-5\" style=\"--awb-content-alignment:center;--awb-margin-top:10px;\"><p style=\"color: #ffffff; text-align: left;\">Our GDPR audit guarantees that your company meets all the requirements of the General Data Protection Regulation. We review your processes and documentation to close data protection gaps.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion-flex-column fusion-animated borderhover2 equali\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-padding-top-medium:20px;--awb-padding-right-medium:20px;--awb-padding-bottom-medium:20px;--awb-padding-left-medium:20px;--awb-overflow:hidden;--awb-bg-color:#1c1c1c;--awb-bg-color-hover:#1c1c1c;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:28%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:28%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"2\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:50px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-4 hover-type-none\"><img decoding=\"async\" width=\"300\" height=\"300\" title=\"cropped-cyber-curriculum-favicon-2.png\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/2022\/02\/cropped-cyber-curriculum-favicon-2-300x300.png\" alt class=\"img-responsive wp-image-2434\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/2022\/02\/cropped-cyber-curriculum-favicon-2-32x32.png 32w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/2022\/02\/cropped-cyber-curriculum-favicon-2-150x150.png 150w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/2022\/02\/cropped-cyber-curriculum-favicon-2-180x180.png 180w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/2022\/02\/cropped-cyber-curriculum-favicon-2-192x192.png 192w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/2022\/02\/cropped-cyber-curriculum-favicon-2-270x270.png 270w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/2022\/02\/cropped-cyber-curriculum-favicon-2-300x300.png 300w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/2022\/02\/cropped-cyber-curriculum-favicon-2.png 512w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-five\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h5 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:20;--minFontSize:20;line-height:var(--awb-typography1-line-height);\">Data protection documentation<\/h5><\/div><div class=\"fusion-text fusion-text-6\" style=\"--awb-content-alignment:center;--awb-margin-top:10px;\"><p style=\"color: #ffffff; text-align: left;\">Our experts will assist you with the development of data protection guidelines, website guidelines, customer data management, technical and organizational measures (TOM) and much more.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-right:200px;--awb-padding-bottom:80px;--awb-padding-left:200px;--awb-padding-right-medium:70px;--awb-padding-left-medium:70px;--awb-padding-top-small:0px;--awb-padding-right-small:40px;--awb-padding-left-small:40px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion-flex-column fusion-animated borderhover2\" style=\"--awb-padding-top:25px;--awb-padding-right:15px;--awb-padding-bottom:25px;--awb-padding-left:15px;--awb-padding-right-medium:40px;--awb-padding-bottom-medium:80px;--awb-padding-left-medium:40px;--awb-padding-top-small:40px;--awb-padding-right-small:30px;--awb-padding-bottom-small:40px;--awb-padding-left-small:30px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-top:0px;--awb-border-right:0px;--awb-border-bottom:0px;--awb-border-left:0px;--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:0%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-margin-bottom-small:0px;--awb-spacing-left-small:0%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-0 fusion_builder_column_inner_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-row\"><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-bottom:40px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left md-text-align-center sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:var(--awb-typography1-line-height);\"><div style=\"text-align: center;\"><span style=\"color: var(--awb-text-color); font-family: var(--h2_typography-font-family); font-size: 1em; font-style: var(--h2_typography-font-style,normal); font-weight: var(--h2_typography-font-weight); letter-spacing: var(--h2_typography-letter-spacing); text-transform: var(--h2_typography-text-transform); background-color: var(--awb-bg-color);\">Request a digital data protection audit with risk analysis<\/span><\/div><\/h2><\/div><div class=\"md-text-align-center sm-text-align-center\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/cyber-curriculum.com\/en\/contact-us\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Arrange an initial consultation<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-padding-top-medium:0px;--awb-padding-top-small:0px;--awb-padding-bottom-small:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-stretch fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-padding-bottom:30px;--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:80px;--awb-spacing-right-large:9.6%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:9.6%;--awb-width-medium:100%;--awb-order-medium:0;--awb-margin-top-medium:0px;--awb-spacing-right-medium:9.6%;--awb-spacing-left-medium:9.6%;--awb-width-small:100%;--awb-order-small:0;--awb-margin-top-small:0px;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-7 fusion-no-small-visibility fusion-text-no-margin\" style=\"--awb-content-alignment:center;--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;\"><p style=\"font-size: 18px;\" data-fusion-font=\"true\">Your Personalized Data Protection Audit<\/p>\n<\/div><div class=\"fusion-title title fusion-title-8 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:35;line-height:var(--awb-typography1-line-height);\">How is data protection audit conducted at Cyber Curriculum<span class=\"registered\">\u00ae<\/span>?<\/h3><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:80px;--awb-padding-top-small:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-stretch fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion-flex-column fusion-animated borderhover2 equali\" style=\"--awb-padding-top:20px;--awb-padding-right:19px;--awb-padding-bottom:20px;--awb-padding-left:20px;--awb-overflow:hidden;--awb-bg-color:#1c1c1c;--awb-bg-color-hover:#1c1c1c;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:22%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:46%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"2\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:50px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-5 hover-type-none\"><img decoding=\"async\" width=\"138\" height=\"138\" title=\"Group 281\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-281.png\" alt class=\"img-responsive wp-image-2561\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-281-66x66.png 66w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-281.png 138w\" sizes=\"(max-width: 138px) 100vw, 138px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-9 fusion-sep-none fusion-title-text fusion-title-size-five\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h5 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:20;--minFontSize:20;line-height:var(--awb-typography1-line-height);\">1. Structured &amp; Detailed Analysis<\/h5><\/div><div class=\"fusion-text fusion-text-8\" style=\"--awb-content-alignment:center;--awb-margin-top:10px;\"><p style=\"color: #ffffff; text-align: left;\">In close collaboration with you, we conduct a thorough inventory to identify all relevant processes and data within your company.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion-flex-column fusion-animated borderhover2 equali\" style=\"--awb-padding-top:20px;--awb-padding-right:19px;--awb-padding-bottom:20px;--awb-padding-left:20px;--awb-overflow:hidden;--awb-bg-color:#1c1c1c;--awb-bg-color-hover:#1c1c1c;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:22%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:46%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"2\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:50px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-6 hover-type-none\"><img decoding=\"async\" width=\"139\" height=\"138\" title=\"Group 282\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-282.png\" alt class=\"img-responsive wp-image-2563\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-282-66x66.png 66w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-282.png 139w\" sizes=\"(max-width: 139px) 100vw, 139px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-10 fusion-sep-none fusion-title-text fusion-title-size-five\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h5 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:20;--minFontSize:20;line-height:var(--awb-typography1-line-height);\">2. Personalized Risk Assessment<\/h5><\/div><div class=\"fusion-text fusion-text-9\" style=\"--awb-content-alignment:center;--awb-margin-top:10px;\"><p style=\"color: #ffffff; text-align: left;\">Using our expertise, we identify and evaluate potential data protection risks and vulnerabilities.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion-flex-column fusion-animated borderhover2 equali\" style=\"--awb-padding-top:20px;--awb-padding-right:19px;--awb-padding-bottom:20px;--awb-padding-left:20px;--awb-overflow:hidden;--awb-bg-color:#1c1c1c;--awb-bg-color-hover:#1c1c1c;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:22%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:46%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"2\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:50px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-7 hover-type-none\"><img decoding=\"async\" width=\"139\" height=\"138\" title=\"Group 284\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-284.png\" alt class=\"img-responsive wp-image-2562\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-284-66x66.png 66w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-284.png 139w\" sizes=\"(max-width: 139px) 100vw, 139px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-11 fusion-sep-none fusion-title-text fusion-title-size-five\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h5 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:20;--minFontSize:20;line-height:var(--awb-typography1-line-height);\">3. Compliance &#8211;<br \/>Audit<\/h5><\/div><div class=\"fusion-text fusion-text-10\" style=\"--awb-content-alignment:center;--awb-margin-top:10px;\"><p style=\"color: #ffffff; text-align: left;\">It is our responsibility to ensure that your company fully complies with relevant data protection regulations, such as GDPR.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion-flex-column fusion-animated borderhover2 equali\" style=\"--awb-padding-top:20px;--awb-padding-right:19px;--awb-padding-bottom:20px;--awb-padding-left:20px;--awb-overflow:hidden;--awb-bg-color:#1c1c1c;--awb-bg-color-hover:#1c1c1c;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:22%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:46%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"2\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:50px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-8 hover-type-none\"><img decoding=\"async\" width=\"227\" height=\"227\" title=\"Group 275\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-275.png\" alt class=\"img-responsive wp-image-2556\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-275-200x200.png 200w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-275.png 227w\" sizes=\"(max-width: 640px) 100vw, 227px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-12 fusion-sep-none fusion-title-text fusion-title-size-five\" style=\"--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h5 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:20;--minFontSize:20;line-height:var(--awb-typography1-line-height);\">4. Tailored Solutions<\/h5><\/div><div class=\"fusion-text fusion-text-11\" style=\"--awb-content-alignment:center;--awb-margin-top:10px;\"><p style=\"color: #ffffff; text-align: left;\">Based on our findings, we develop a customized action plan to address identified vulnerabilities and ensure compliance with data protection laws.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:80px;--awb-padding-top-medium:0px;--awb-padding-top-small:100px;--awb-padding-bottom-small:60px;--awb-margin-top-small:-100px;--awb-margin-bottom-small:-100px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-flex-align-self-center fusion-no-small-visibility\" style=\"--awb-padding-right-medium:0px;--awb-padding-left-medium:0px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-margin-bottom-medium:0px;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:1;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-lottie fusion-lottie-1\" data-id=\"1\"><div class=\"fusion-lottie-animation\" data-path=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/12.json\" data-loop=\"1\" data-reverse=\"0\" data-speed=\"1\" data-trigger=\"none\" data-start_point=\"0\" data-end_point=\"100\"><lottie-player loop=\"1\" speed=\"1\"><\/lottie-player><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-13 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:1;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-13 fusion-no-small-visibility fusion-sep-none fusion-title-text fusion-title-size-three gradient-text\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:35;line-height:var(--awb-typography1-line-height);\">Why is data protection essential in the corporate world?<\/h3><\/div><div class=\"fusion-title title fusion-title-14 fusion-no-medium-visibility fusion-no-large-visibility fusion-sep-none fusion-title-text fusion-title-size-four gradient-text\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">WHY IS DATA PROTECTION ESSENTIAL IN THE CORPORATE WORLD?<\/h4><\/div><div class=\"fusion-lottie fusion-lottie-2 fusion-no-medium-visibility fusion-no-large-visibility\" data-id=\"2\"><div class=\"fusion-lottie-animation\" data-path=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/12.json\" data-loop=\"1\" data-reverse=\"0\" data-speed=\"1\" data-trigger=\"none\" data-start_point=\"0\" data-end_point=\"100\"><lottie-player loop=\"1\" speed=\"1\"><\/lottie-player><\/div><\/div><div class=\"fusion-text fusion-text-12 sm-text-align-center\" style=\"--awb-text-color:#ffffff;\"><p>Comprehensive data protection in companies plays an important role, as it strengthens the trust of customers and business partners, ensures compliance with legal regulations, protects against data loss and cyber attacks and provides a competitive advantage.<\/p>\n<\/div><div class=\"sm-text-align-center\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-2 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/cyber-curriculum.com\/en\/contact-us\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Arrange an initial consultation<\/span><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-8 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:80px;--awb-padding-top-medium:0px;--awb-padding-top-small:0px;--awb-padding-bottom-small:14px;--awb-margin-top-small:100px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-14 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-15 fusion-no-small-visibility fusion-sep-none fusion-title-text fusion-title-size-three gradient-text\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:35;line-height:var(--awb-typography1-line-height);\">Why choose Cyber Curriculum<span class=\"registered\">\u00ae<\/span> as your external data protection officer?<\/h3><\/div><div class=\"fusion-title title fusion-title-16 fusion-no-medium-visibility fusion-no-large-visibility fusion-sep-none fusion-title-text fusion-title-size-four gradient-text\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">WHY CYBER CURRICULUM AS AN EXTERNAL DATA PROTECTION OFFICER?<\/h4><\/div><div class=\"fusion-lottie fusion-lottie-3 fusion-no-medium-visibility fusion-no-large-visibility\" data-id=\"3\" style=\"--awb-margin-top:-100;--awb-margin-bottom:-100;\"><div class=\"fusion-lottie-animation\" data-path=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/18-1.json\" data-loop=\"1\" data-reverse=\"0\" data-speed=\"1\" data-trigger=\"none\" data-start_point=\"0\" data-end_point=\"100\"><lottie-player loop=\"1\" speed=\"1\"><\/lottie-player><\/div><\/div><div class=\"fusion-text fusion-text-13 sm-text-align-center\" style=\"--awb-text-color:#ffffff;\"><p>Our clients benefit from the support of an extensive team of certified data protection experts who not only have expertise in their sector, but also understand their specific challenges.<\/p>\n<\/div><div class=\"sm-text-align-center\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-3 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/cyber-curriculum.com\/en\/contact-us\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Arrange an initial consultation<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-15 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-no-small-visibility\" style=\"--awb-padding-right-medium:0px;--awb-padding-left-medium:0px;--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:1;--awb-spacing-right-medium:0%;--awb-margin-bottom-medium:0px;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-lottie fusion-lottie-4\" data-id=\"4\"><div class=\"fusion-lottie-animation\" data-path=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/18-1.json\" data-loop=\"1\" data-reverse=\"0\" data-speed=\"1\" data-trigger=\"none\" data-start_point=\"0\" data-end_point=\"100\"><lottie-player loop=\"1\" speed=\"1\"><\/lottie-player><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-9 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:80px;--awb-padding-top-small:60px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-16 fusion-flex-column fusion-animated borderhover2\" style=\"--awb-padding-top:100px;--awb-padding-right:80px;--awb-padding-bottom:100px;--awb-padding-left:80px;--awb-padding-right-medium:40px;--awb-padding-bottom-medium:80px;--awb-padding-left-medium:40px;--awb-padding-top-small:40px;--awb-padding-right-small:30px;--awb-padding-bottom-small:40px;--awb-padding-left-small:30px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-top:0px;--awb-border-right:0px;--awb-border-bottom:0px;--awb-border-left:0px;--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:100%;--awb-margin-top-large:40px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:0%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-margin-bottom-small:0px;--awb-spacing-left-small:0%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-1 fusion_builder_column_inner_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-14 md-text-align-center sm-text-align-center fusion-text-no-margin\" style=\"--awb-margin-bottom:0px;\"><p style=\"color: var(--awb-color1); font-size: 18px;\" data-fusion-font=\"true\">Have we cought your Attention?<\/p>\n<\/div><div class=\"fusion-title title fusion-title-17 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left md-text-align-center sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:var(--awb-typography1-line-height);\">The choice of the best data protection solution is in your hands.<\/h2><\/div><div class=\"fusion-text fusion-text-15 md-text-align-center sm-text-align-center\"><p style=\"color: var(--awb-color1);\">Our data protection experts are ready to accompany you on this journey and ensure that you find the optimal solution for your requirements.<\/p>\n<\/div><div class=\"md-text-align-center sm-text-align-center\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-4 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/cyber-curriculum.com\/en\/contact-us\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Arrange an initial consultation<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-2 fusion_builder_column_inner_1_3 1_3 fusion-flex-column\" style=\"--awb-padding-right-medium:100px;--awb-padding-left-medium:100px;--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-margin-top-small:50px;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-lottie fusion-lottie-5 fusion-no-small-visibility\" data-id=\"5\" style=\"--awb-margin-top:-90px;--awb-margin-right:-70px;--awb-margin-bottom:-150px;--awb-margin-left:-70px;\"><div class=\"fusion-lottie-animation\" data-path=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/2-1.json\" data-loop=\"1\" data-reverse=\"0\" data-speed=\"1\" data-trigger=\"viewport\" data-start_point=\"0\" data-end_point=\"100\" data-animationoffset=\"top-into-view\"><lottie-player loop=\"1\" speed=\"1\"><\/lottie-player><\/div><\/div><div class=\"fusion-lottie fusion-lottie-6 fusion-no-medium-visibility fusion-no-large-visibility\" data-id=\"6\" style=\"--awb-margin-top:-70px;--awb-margin-right:-100px;--awb-margin-bottom:-50px;--awb-margin-left:-100px;\"><div class=\"fusion-lottie-animation\" data-path=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/2-1.json\" data-loop=\"1\" data-reverse=\"0\" data-speed=\"1\" data-trigger=\"none\" data-start_point=\"0\" data-end_point=\"100\"><lottie-player loop=\"1\" speed=\"1\"><\/lottie-player><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":13,"featured_media":0,"parent":2668,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-2727","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Data protection audit - CyberCurriculum<\/title>\n<meta name=\"description\" content=\"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/data-protection-audit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data protection audit - CyberCurriculum\" \/>\n<meta property=\"og:description\" content=\"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/data-protection-audit\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberCurriculum\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-22T06:28:41+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"59 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/it-security-compliance\\\/data-protection-audit\\\/\",\"url\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/it-security-compliance\\\/data-protection-audit\\\/\",\"name\":\"Data protection audit - CyberCurriculum\",\"isPartOf\":{\"@id\":\"\\\/#website\"},\"datePublished\":\"2023-12-20T13:54:35+00:00\",\"dateModified\":\"2024-04-22T06:28:41+00:00\",\"description\":\"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/it-security-compliance\\\/data-protection-audit\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/it-security-compliance\\\/data-protection-audit\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/it-security-compliance\\\/data-protection-audit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/home\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Security &amp; Compliance\",\"item\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/it-security-compliance\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Data protection audit\"}]},{\"@type\":\"WebSite\",\"@id\":\"\\\/#website\",\"url\":\"\\\/\",\"name\":\"CyberCurriculum\",\"description\":\"Cyber Security \u00bb IT-Consulting &amp; -Sicherheit\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data protection audit - CyberCurriculum","description":"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/data-protection-audit\/","og_locale":"en_US","og_type":"article","og_title":"Data protection audit - CyberCurriculum","og_description":"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?","og_url":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/data-protection-audit\/","og_site_name":"CyberCurriculum","article_modified_time":"2024-04-22T06:28:41+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"59 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/data-protection-audit\/","url":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/data-protection-audit\/","name":"Data protection audit - CyberCurriculum","isPartOf":{"@id":"\/#website"},"datePublished":"2023-12-20T13:54:35+00:00","dateModified":"2024-04-22T06:28:41+00:00","description":"What is the value of a complex, automated network monitoring system if the door to your data center is not locked?","breadcrumb":{"@id":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/data-protection-audit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/data-protection-audit\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/data-protection-audit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/cyber-curriculum.com\/en\/home\/"},{"@type":"ListItem","position":2,"name":"IT Security &amp; Compliance","item":"https:\/\/cyber-curriculum.com\/en\/it-security-compliance\/"},{"@type":"ListItem","position":3,"name":"Data protection audit"}]},{"@type":"WebSite","@id":"\/#website","url":"\/","name":"CyberCurriculum","description":"Cyber Security \u00bb IT-Consulting &amp; -Sicherheit","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/pages\/2727","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/comments?post=2727"}],"version-history":[{"count":21,"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/pages\/2727\/revisions"}],"predecessor-version":[{"id":3991,"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/pages\/2727\/revisions\/3991"}],"up":[{"embeddable":true,"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/pages\/2668"}],"wp:attachment":[{"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/media?parent=2727"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}