Security management audit
– Identification of weak points of the company with regard to best practice and especially current cyber threats (the audit will check not only internal legislation but also the application of security rules in the practical functioning of the company)
Vulnerability analysis of the company
– Combination of deployment of automatic scanning tools in the company environment and manual verification in accordance with the ISSAF methodology (Information System Security Assessment Framework)
Red Team Operations
– Controlled cyber attack on the company
– Flexible security testing at multiple layers (technology, people, buildings) and in-depth testing that adapts to the findings
Risk analysis processing
– Cataloging of company assets, a definition of risks, processing of impact analysis (Business Impact Analysis)
Business Continuity Management
– Delivery of practically usable guidelines and work procedures, processing of functional processes of Disaster / Recovery, provision of BCM management services in the form of outsourcing