What & how we do it?

An holistic approach to


One Technology


Check how
Two Process


Check how
Three Culture


Check how

Through Technology

IT Security Management
Protection! It’s all about prevention!
  • Security Architectures Evaluation and Analisys
  • Security Architectures Design
  • Security Controls

Trough Processes

Management Systems
Management! It’s all about governance!
  • Risk Management
  • Information Security Management
  • Data Privacy Management
  • Data Protection Impact Assessment
  • CSA – Cloud Control Matrix
Consultancy and Training
Training! It’s all about knowledge!
  • Risk Management (ISO 31000 | ISO 31010)
  • Personal Information Management (BS 100012)
  • Information Security Management (ISO 27001 | ISO 27002 …)
  • Privacy Impact Assessment (ISO 29134)
  • Privacy Framework (ISO 29100 | ISO 29010 | ISO 29109.2)
  • Business Continuity Management (ISO 22301 | 22313)
  • IT Service Management (ISO 20000-1 | 20000-2)

Trough Culture

Project Planning
Obtain support from customer’s organization management and assets
Behavioral Assessment
Drafting and submission of two separate questionnaires for managers / department officers and employees
Best Practises Assessment
Interview scheduling and execution, and evaluation report drafting related to requirements
Awareness Training and Workshops
Training and content building, awareness and clarification workshops regarding information safety

It's all about accessing and managing information at the right moment and for the right purpose