Ask us a question

You are here

Design and Implement a Data Protection Management System 

Our proven, structured methodology to the GDPR is four fold



The biggest challenge to achieving GDPR compliance resides in your ability to coordinate various activities. This requires a broad spectrum of different skill sets, each evolving at a different pace. Integrated into proper governance of data privacy, our GDPR compliance methodology will enhance your organization and enable it to demonstrate accountability and transparency.


The legal dimension covers all legal obligations such as notification to data subject, setting up the legal ground for processing and the data processing register, as well as such contractual changes as required with suppliers, customers and partners.

Data governance covers all aspects related to data architecture, flows and governance, including the breach management process.

Information security covers all activities pertaining to the proper management and governance of information security risks as well as awareness programmes.

The Technology part is dedicated to helping IT teams identify and implement appropriate security and privacy measures so as to support the overall compliance programme. This domain is closely tied to the privacy by design concept. 

What are the benefits of such an implementation method?

  • Ensure that you cover all aspects of the GDPR within your organization, including IT, Legal and Business
  • Enable a clear identification of all stakeholders, and the effort required by all parties
  • Facilitate the definition of roles and responsibilities during and after implementation
  • Entail adapted awareness for the implementation team
  • Provide a tailored and independent roadmap, and clear cost control
  • Prioritize activities and quick wins
  • Provide easy metrics


A methodology empowered with governance and project management skills

We are convinced that a proper implementation of such a project cannot be successful without proper project management and governance with our customers. Our team accordingly includes project managers with appropriate skills and competences (Prince2 and Agile mainly) who can proceed with our clients’ governance and project management processes and tools, or use the Approach project management tools and processes.

Based on your compliance journey, Approach can support your organization from assessment to daily operations. 

Client references


Published on 16 May 2019

Approach opens an office in Antwerp

In order to pursue its growth ambitions and become the Belgian reference in cyber security, Approach opens a second office...
Read more

Published on 05 April 2019

Get a grant for your IT security projects - Brussels-Capital Region

Since March 25, 2019, micro, small and medium-sized companies that have a headquarters in the Brussels-Capital Region can...
Read more

Published on 14 February 2019

Why should your organisation go for ISO 27001 certification?

Second chapter of our ISO 27001 story presented by our experts. Learn why obtaining the ISO 27001 certificate...
Read more

Published on 05 June 2018

Approach is recruiting IT Security experts

The Waldorado team from RTL TVI visited us to know more about our activites and the profiles we are recruiting.  Watch...
Read more

Published on 06 March 2018

Why compliance monitoring is critical for your business? 

With regulatory requirements continuously increasing, compliance and risk management should be a business process for all...
Read more

Published on 28 September 2017

Europe actively looking at Data Protection

Read the interview of Laurent Deheyer and Michaël Raison in the Info Enterprendre magazine 
Read more

Published on 14 December 2017

Our approach and services to GDPR - brochure

Make sure you comply with the new GDPR by using our proven methodology! Download our brochure to learn more.
Read more

Published on 04 May 2018

GDPR - why a CISO!

DO I need a CISO? Can the CISO be a DPO?  ... Download our white paper to learn more. 
Read more



Approach organize generic and customized security trainings on or off site. Have a look at our catalog!

Read more

Our approach to cyber-security

Our customers benefit from the expertise and talent of our people, combined with pragmatic and proven methods and the efficiency brought by our assets:


Expertise and talent

Since 2001 we have applied our experience in cyber-security gained in various industries, from small to large businesses. Our people are seasoned, certified professionals who continuously improve and extend their knowledge.


Pragmatic and proven methods

We rely on most recognised, easily auditable and adopted standards and good practices and apply them pragmatically. We always tailor our approach to your particular context, needs and organisation culture.


Asset-based approach

We make use of the most advanced and reliable tools and solutions to support our services. This enables us to be more efficient during delivery, enforce the use of standard auditable methods and provide transparency about our achievements and your results.

Certified professionals
Success stories
Year of establishment
+ 0%
Average annual growth