• Facebook
  • X
  • Instagram
  • RSS
Njordium Cyber Group
  • Home
  • Who We Are
  • What We Do
    • Information Security
      • Incident Response and Recovery
      • Virtual CISO (vCISO)
    • Governance Risk Compliance
      • Financial & Payment Compliance
    • Process Data Analysis
    • Third-Party Risk Management
    • Transformation Management
    • Training and Education
  • Insights
    • Documents
  • News & Events
  • Reach Out
  • Legal
  • Svenska
Select Page

Introducing OASIS STIX-FCI: The Open Standard to Combat Financial Crime

Aug 20, 2025 | Compliance, Risk Management, STIX-FCI

Introducing OASIS STIX-FCI: The Open Standard to Combat Financial Crime We’re proud to announce an exciting new initiative: the OASIS Financial Crime Intelligence Extension for STIX (OASIS STIX-FCI). This project aims to create the world’s first open...

Challenges in Understanding AML and Fraud Use Cases

Jul 16, 2025 | Compliance, Risk Management, STIX-FCI

Challenges in Understanding AML and Fraud Use Cases Introduction Financial crimes such as fraud and money laundering present a growing threat to global economies, costing an estimated $2 to $5 trillion annually. To counter these threats, financial threat intelligence...

Harmonising AML Attributes for Effective Financial Crime Prevention

Jul 10, 2025 | Compliance, Risk Management, STIX-FCI

Harmonising AML Attributes for Effective Financial Crime Prevention Proposing the development of a STIX-AML extension built on the Structured Threat Information Expression (STIX) framework. The fight against financial crime in the European Union—whether money...

Navigating Security and Privacy Challenges in the EU AI Act: The Role of ISO/IEC 42001

Jun 12, 2025 | AI, Compliance

Navigating Security and Privacy Challenges in the EU AI Act: The Role of ISO/IEC 42001 As artificial intelligence integrates into critical decision-making, the European Union’s AI Act sets a global standard for trustworthy AI (EU AI Act, 2024). This regulation...

Microsoft’s blocking of ICC emails raises new questions about data sovereignty in the EU

May 28, 2025 | Compliance, Third-Party Risk Management (TPRM)

Microsoft’s blocking of ICC emails raises new questions about data sovereignty in the EU When Microsoft recently shut down email accounts belonging to the International Criminal Court (ICC) due to US sanctions, serious questions were once again raised about...

US Cloud at Risk? EU Data Transfers on Shaky Ground

Feb 19, 2025 | Compliance, Third-Party Risk Management (TPRM)

Transatlantic data flows face new uncertainty as the US administration moves to weaken key privacy oversight. The Privacy and Civil Liberties Oversight Board (PCLOB)—a critical body that helped justify the EU-US Transatlantic Data Privacy Framework (TADPF)—is now...

Recent Posts

  • Introducing OASIS STIX-FCI: The Open Standard to Combat Financial Crime
  • Challenges in Understanding AML and Fraud Use Cases
  • Harmonising AML Attributes for Effective Financial Crime Prevention
  • Njordium and Odin Cyber Security Partner around GRC Across the Nordic Region
  • Navigating Security and Privacy Challenges in the EU AI Act: The Role of ISO/IEC 42001
  • Facebook
  • X
  • Instagram
  • RSS
© 2025 Njordium Cyber Group AB. All Rights Reserved.
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behaviour or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behaviour or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}