Key Differentiators of Panda Bear Consulting

Panda Bear Consulting consultants come from different backgrounds including technical and legal fields, this ensures pragmatic compliance respectful of the rules but also of the needs of the business.

Our company is providing a full suite of easy-access and customizable tools, procedure templates, and controls to ease security management.Our missions meet the following objectives:

· Implement a Privacy Information Management System (PIMS)

· Implement a Risk Management System

· Manage PIMS & GDPR Compliancy according to standards.


Quality of our consultants:

All our consultants worked in the information security domains in the past.

All have the expertise and some of them are certified, either in implementation or audit in one or more of the following areas:



· ISO/IEC27001:2022 Information security, cybersecurity, and privacy protection — Information security management systems — Requirements.

· ISO/IEC 27002:2022 Information security, cybersecurity, and privacy protection — Information security controls

· ISO/IEC 27005:2022 Information technology – Security techniques – Information security risk management.

· ISO/IEC 27011: Information technology – Security techniques – Code of practice for Information security controls based on ISO/IEC 27002 for telecommunications organizations

· ISO/IEC 27017: Information technology – Security techniques – Code of practice for information security controls based on ISO/IEC 27002 for cloud services.

· ISO/IEC 27018: Information technology – Security techniques – Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors




· ISO/IEC 27018: Information technology – Security techniques – Code of practice for protection of personally identifiable information (PII) in public clouds acting as PII processors

· ISO/IEC 27031:2011 Information technology – Security techniques – Guidelines for information and communication technology readiness for business continuity.

· ISO/IEC 27032:2012 Information technology – Security techniques – Guidelines for cybersecurity.

· ISO/IEC 27701:2019 Security techniques – Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management – Requirements and guidelines

· GDPR – Regulation (EU) 2016/679 – General Data Protection Regulation

· Data Protection Act 2018 (UK)

· Data Protection Officer Certification (DPO)


DPO as a Service

All our consultants worked in the information security domains in the past.

Our DPO aaS solution provides you with a highly experienced Data Protection Officer (DPO) who works on your site or remotely as an integral member of your team.

Depending on your maturity level we can dedicate a more entrepreneur-type profile during deployment and switch to a more controller-type profile for day-to-day management.

You benefit from a knowledgeable, hands-on data protection professional who undertakes the DPO’s responsibilities in an extremely cost-effective way, and is backed by the support, shared best practices, tools and documentation from our internal library.