CONSULTING – Provide technical advice needed to analyze and reorganize business procedures with a view to increasing security and reliability; Define security standards for the management of existing business infrastructure; Identify vulnerabilities, anomalies, weaknesses or critical points in facilities (information and logistics); Identify optimal solutions to prevent malfeasance, intrusion and other mishaps; Provide technical and decision-making support on technologies to be adopted based on analysis of risks, resources and costs.
NIS2 – The NIS2 directive updates the 2016 NIS, extending cybersecurity obligations to more areas and imposing more stringent requirements. We offer consulting, design and implementation to help you comply with NIS2, with a focus on logging, incident reporting, staff training and corporate responsibility. With our support, you can avoid penalties of up to €10 million or 2 percent of annual revenue while protecting your systems and data.
- Analysis of resources to be protected (services, data, infrastructure, personnel, ....)
- Risk analysis
- Identification of optimal security measures
- Defining risk management strategies
- Drafting procedures related to security (first response, detection of possible intrusions, ...)
- Drafting of user behavioral rules related to safety
- Drafting rules for user access to information, services, and facilities
- Consulting to identify the most appropriate solutions to be implemented within the company's structure (interventions on systems, installation of new products, integration with existing procedures, ...)
- Research of critical points
- Research of infrastructure vulnerabilities
- Intrusion simulations studied and developed “ad hoc”
- Checks from the inside of the company
- Checks on possible interception of critical information
- Checks on the security of computer and telephone systems
- Checks on the security of wireless equipment
- Verification of security policies
- Drafting of technical documentation containing descriptions of the methodologies used, vulnerabilities found and proposed improvement solutions.
- Initial audit and identification of cybersecurity deficiencies.
- Identification of management figures who will support the adaptation.
- Design of the adaptation plan.
- Implementation of the plan.
- Drafting of related documentation.
- Testing, audits and reviews of the cybersecurity plan.
- Application of updates and corrective measures.
- Repetition of the last two points periodically (usually in intervals of 6 to 18 months).