What & how we do it?

An holistic approach to

CONFIDENTIALITY | INTEGRITY | AVAILABILITY


One Technology

Technology

Check how
Two Process

Processes

Check how
Three Culture

Culture

Check how

Through Technology


IT Security Management
Protection! It’s all about prevention!
  • Security Architectures Evaluation and Analisys
  • Security Architectures Design
  • Security Controls
IP Core Networks Management
Availability! It’s all about network planning!
  • Network Architecture Design (High-Level)
  • Network Requirements Design (Low-Level)
  • SDN (Software Defined Networks)
  • NFV (Network Functions Virtualization)

Trough Processes


Management Systems
Management! It’s all about governance!
  • Risk Management
  • Information Security Management
  • Data Privacy Management
  • Data Protection Impact Assessment
  • CSA – Cloud Control Matrix
Consultancy and Training
Training! It’s all about knowledge!
  • Risk Management (ISO 31000 | ISO 31010)
  • Personal Information Management (BS 100012)
  • Information Security Management (ISO 27001 | ISO 27002 …)
  • Privacy Impact Assessment (ISO 29134)
  • Privacy Framework (ISO 29100 | ISO 29010 | ISO 29109.2)
  • Business Continuity Management (ISO 22301 | 22313)
  • IT Service Management (ISO 20000-1 | 20000-2)

Trough Culture


Project Planning
Obtain support from customer’s organization management and assets
Behavioral Assessment
Drafting and submission of two separate questionnaires for managers / department officers and employees
Best Practises Assessment
Interview scheduling and execution, and evaluation report drafting related to requirements
Awareness Training and Workshops
Training and content building, awareness and clarification workshops regarding information safety

It's all about accessing and managing information at the right moment and for the right purpose