Blog | Sparkurity by Juris Puce

Resources & Events

Discover upcoming events, past recordings, and valuable resources on AI and cybersecurity.

All Resources & Events

The Risk Owner's Guide to Effective Risk Reviews

The Risk Owner's Guide to Effective Risk Reviews

A comprehensive guide for risk owners on how to effectively prepare for and conduct risk reviews, including key responsibilities and best practices.

From Business Impact Analysis to Business Continuity Planning: A Comprehensive Guide

From Business Impact Analysis to Business Continuity Planning: A Comprehensive Guide

Learn how to conduct a thorough Business Impact Analysis and develop an effective Business Continuity Plan to ensure your organization can withstand and recover from disruptions.

Building AI Usage Policy for Your Organization

Building AI Usage Policy for Your Organization

Learn how to develop and implement effective AI usage policies to address organizational challenges and regulatory requirements

Futureproof Your Startup for EU Cybersecurity Requirements

Futureproof Your Startup for EU Cybersecurity Requirements

A comprehensive guide to navigating EU cybersecurity regulations for startups and scale-ups

Past Event: BDA - Kā neiekļūt NIS 2 un DORA slazdos (Latvian only)

Past Event: BDA - Kā neiekļūt NIS 2 un DORA slazdos (Latvian only)

Latvian: Recording about NIS 2 and DORA implications for organizations

AWS Cloud Adventures with PEAK DEFENCE

AWS Cloud Adventures with PEAK DEFENCE

Exploring AWS cloud security strategies and best practices with PEAK DEFENCE

GDPR and Security Regulation Challenges in Software Development

GDPR and Security Regulation Challenges in Software Development

My DevopsDays presentation on navigating GDPR and security regulations in modern software development practices

Effects of AI on Cybersecurity - PECB Conference 2018

Effects of AI on Cybersecurity - PECB Conference 2018

My presentation at the PECB Conference on how artificial intelligence is transforming both offensive and defensive cybersecurity strategies