The IT security law 2015: Recipients, impacts and critics

In this white paper, in addition to the definition of important key terms of the law, public criticism of the law is discussed and an outlook on the next steps for the adoption of pending regulations is given.
Please click here to read the whitepaper.