Each January 28th is European Data Protection Day. This date, beyond the symbolic gesture, invites companies, administrations, and security professionals to pause for a moment and review how they are protecting information.
Not only from a legal standpoint, but also from a technical and strategic perspective. For CISOs, security directors, and IT managers, this day is a good excuse to ask uncomfortable but necessary questions: from knowing what data is being managed to what threats may affect it.
European Data Protection Day: much more than just an anniversary
European Data Protection Day commemorates the signing of the Council of Europe Convention 108, the first international treaty on data protection. Since then, the regulatory framework has evolved to the GDPR, which today sets the standard in Europe.
However, compliance with regulations alone does not guarantee that data is truly protected. The legislation establishes the “what,” but the “how” depends on each organization. And that’s where many companies encounter difficulties.
According to data from the European Union Agency for Cybersecurity (ENISA), a significant portion of security incidents are related to basic visibility failures, incorrect configurations, or exposed assets that were not being monitored.
In this sense, the European Data Protection Day serves as a reminder: protection is not a state; it is a journey.

Data protection and cybersecurity: two sides of the same coin
For years, data protection has been approached as a legal matter, while cybersecurity was seen as a purely technical issue. Today, that separation no longer makes sense.
Unauthorized access, a data breach, or a security breach don’t just pose a technical problem. They have direct consequences on the privacy of individuals, in the company’s reputation, and, of course, in regulatory compliance.
For security managers, this means taking a broader approach that involves identifying risks, anticipating threats, and reducing exposure, which is as important as reacting to incidents.
The current challenge: managing the actual exposure to threats
One of the biggest problems CISOs face is the lack of visibility.. Hybrid infrastructures, cloud services, external providers, remote devices… The traditional perimeter has disappeared.
This is where the Continuous Threat Exposure Management (CTEM) approach proposes moving from one-off reviews to continuous risk assessment.
CTEM: an approach aligned with European Data Protection Day
The CTEM approach aligns with the spirit of European Data Protection Day, as it focuses on prevention and continuous improvement.
CTEM is not just about detecting vulnerabilities, but about understanding the complete context:
- What assets are exposed.
- Which threats are most likely, depending on the sector.
- What impact would a breach of personal data have.
- Which risks should really be prioritized.
This approach helps security teams make decisions based on real data rather than endless lists of alerts.
Kartos by Enthec: Continuous Visibility for Companies
This is where solutions like Kartos by Enthec, bring clear value to organizations.. Kartos is designed for companies that need continuous cyber surveillance and an up-to-date view of their threat exposure.
From a CTEM perspective, Kartos allows:
- Identify exposed digital assets, including those that were not properly inventoried.
- Detect information leaks, compromised credentials, or accessible sensitive data.
- Continuous monitoring of how the attack surface evolves.
- Prioritize risks based on their actual impact on the organization and personal data.
This is especially relevant for regulated sectors or companies that manage large volumes of sensitive information, where a breach can have significant legal and reputational consequences.
In the context of European Data Protection Day, having these tools is not an extra but a key element in moving from formal compliance to effective protection.
The human factor and the need for anticipation
Not all risks come from external attacks. Human error, password reuse, or accidental exposure of information remain common causes of incidents.
According to the Verizon Data Breach Report (DBIR), the human factor is present in a high percentage of security incidents, whether due to phishing, compromised credentials, or incorrect configurations.
Continuous cyber surveillance enables us to detect these situations before they escalate. It’s not about pointing fingers, but about anticipate and reduce the impact.
You might be interested in→ Cybersecurity and the human factor: the most common mistake in digital protection.
Personal data protection also outside the company
Although this article focuses on a business approach, it’s important to remember that data protection doesn’t end in the corporate environment. Managers, employees, and professionals are also exposed individuals.
In this sense, Qondar, Enthec’s solution geared towards individuals, extends the concept of cyber surveillance to the personal sphere, helping to detect data exposures, impersonations, or leaks that can end up affecting the company as well.
Because, in many cases, a gap starts outside.
European Data Protection Day as a starting point
More than just a date for an internal memo or a social media post, European Data Protection Day can be a great time to:
- Review the organization’s actual attack surface.
- Evaluate whether current tools offer continuous visibility.
- Align the security strategy with a CTEM approach.
- Involve management in the importance of protecting personal data.
Modest but well-directed steps can generate a significant impact in the medium term.
Looking ahead: from reaction to prevention
The trend is clear: The organizations that best protect data are not those that react fastest, but those that detect threats first.. Moving from a reactive to a preventive approach is one of the major challenges facing cybersecurity today.
Tools like Kartos, within the Enthec solutions ecosystem, help make that leap by providing context, continuity, and a realistic view of risk.
European Data Protection Day shouldn’t be just an annual reminder. For CISOs and security directors, it’s an opportunity to rethink how threat exposure is managed and whether decisions are based on up-to-date, relevant information.
Data protection today demands continuous visibility, intelligent prioritization, and anticipation capabilities.. And there, the CTEM approach is consolidated as a coherent response to a problem that continues to grow.
If you want to know how Kartos can help you improve the ongoing management of threat exposure in your company, this might be a good time to take the next step and talk to the Enthec team.

