Product
Product tour
Data protection & GDPR
Manage all privacy related tasks from one place with perfect overview.
Information Security & ISMS
Tighten your security with class-leading control management.
Compliance workflows
Improve efficiency and collaboration and minimise your workload.
Onboarding and Support
Get smoothly onboarded; we've got your support all the way
Start free and expand as you go
Get started in minutes
Security & Data
The security of our users’ data is a fundamental
Integrations
Use our standard integrations or public API
Workflows
Data Protection
GDPR
System & Vendor Management
Vendor Audit
Processing Activities
Data Breach Management
TIA
DPIA
DSAR
Information Security
ISMS
System & Vendor Management
Incident Management
Frameworks
ISO 27000-series
NIS2
CIS18
Common
Risk Management
Task Management
Track Policies
Customers
Pricing
Resources
Resources
Blog
Navigate the frontier of data protection and information security
Webinars
Unlock knowledge, ignite expertise: dive into our webinar hub
E-books
Access our e-books to gain valuable insights on compliance
Newsletter
Join 3,000 of your peers and subscribe to our newsletter
Videos
Deepdive into our compliance management and how-to videos
Help Center
Find articles related to the product
English
Dansk
Login
Book demo
Sustainable Compliance Blog
Featured
Building a strong NIS2 Programme with Wired Relations
By
Gry Josefine Løvgren
October 23, 2024
Featured
Building a strong NIS2 Programme with Wired Relations
Featured
Sustainable energy meets sustainable compliance: Teaming up for a better future
Featured
Wired Relations is nominated for EY’s Entrepreneur Of The Year Award
Dive into our blog
Awareness & Training
Behind the firewall
Best practices
DPIA
Data protection
Information Security
NIS2
Product updates
Risk management
Success stories
Vendor management
Wired Relations
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Data protection
/
DPIA
/
Behind the firewall: Claire Archibald
Information Security
/
Data protection
/
What is GRC? A simple breakdown of Governance, Risk, and Compliance
Best practices
/
Information Security
/
Infosec frameworks: An overview of the most common ones
Data protection
/
Information Security
/
Why GRC is crucial in data protection and information security
Information Security
/
Data protection
/
What is GRC software and what makes it powerful?
Best practices
/
Information Security
/
6 Takeaways from Infosec at Billund Airport
Best practices
/
Information Security
/
Data protection
/
The power of unity: 10 reasons why Data Protection and Information Security should join forces
Best practices
/
Data protection
/
Success stories
/
Toms Group: Structure and overview free up time for important tasks
Behind the firewall
/
Behind the firewall: Arthur Edelstein
NIS2
/
Building a strong NIS2 Programme with Wired Relations
Success stories
/
Sustainable energy meets sustainable compliance: Teaming up for a better future
Success stories
/
Det Faglige Hus: "Wired Relations is a collaboration platform"
Success stories
/
Techcollege: "The Implementation of Wired Relations was a smooth process"
Behind the firewall
/
Data protection
/
Behind the firewall: Rebecca Balebako
Wired Relations
/
Wired Relations at Privacy Space Live
Next