CyberSecurity Services

Governance

  • Information Security Program
  • Policies & Procedures
  • Processes (Business Continuity, etc)
  • CISO/CSO as a Service
Read more

Risk Management

  • Risk Management
  • Risk Assessment (Ethical Hacking, GDPR Audit)
  • Program & process maturity review
Read more

Architecture

  • Secure topology & solutions
  • Design review
  • Secure systems management
  • Monitoring (SIEM, IDS)
Read more

Industrial Security

  • ICS/SCADA/OT
  • Industrial automation - secure design & design review
Read more

Governance

What is it?

CyberSecurity Governance is a fancy term for "how an organization manages and controls its CyberSecurity". 
It defines who's responsible & accountable for what, and provides the required oversight to ensure that risks are identified and mitigated.
The program consists of a set of processes, documents called "policies & procedures", and reporting (metrics/KPIs).

We can help you build, refine, implement and/or review your CyberSecurity Governance program, and we prefer to use a standard methodology to do so (ISO 2700x).

Sounds scary? Sounds overkill? That's understandable ... if you don't have a program yet. 
Don't worry, our approach is very pragmatic. We'll start by looking at your critical systems & processes first, and work our way up from there. 
Most of the things defined in the ISO standard are common sense really. 
In fact, you may already be doing some of the tasks today. In that case, we'll only formalize them in a document. That's it. Plain and simple.

Contact us to discuss further

Why do I need it?

Doing business is all about risk. CyberSecurity is a part of that, and managing it properly can be a true enabler to your business
Do you have a clear view on your IT and CyberSecurity risks? Do you fully understand the impact of those risks as well?  Are you able to protect your business in a good manner? 

The goal of CyberSecurity is to reduce CyberSecurity risks, allowing you to take/increase business risks in other areas of your company, f.i. to create a competitiveadvantage over your customers.  

On top of that, if you're doing business in Europe, then you should be already familiar with GDPR.  The  General Data Protection Regulation requires you to have certain controls & processes to protect personal data. When things go wrong, the fines can be severe, especially if you were not really following the rules.  This can be avoided.

Security governance is what glues everything together: upper management support, technology, risk management, policies & procedures, awareness, audits, etc.
 
It's not rocket science, and we can help you set it up, addressing your specific needs, using a standard framework such as ISO2700x  #commonsense

Processes?

Over the years, we've built significant expertise in the development of certain key processes, including:

change management (what are you going to do to make sure that a change to your systems doesn't halt your business)

incident management (what are you going to do if something happens)

vulnerability management (how are you going to protect your systems, and detect & mitigate vulnerabilities)

business continuity (what if something really bad happens, how can you prevent going out of business)

Read more

Can't afford full-time security staff?

We fully understand, no problem at all. 

Our "CISO/CSO as a service" program means that we can provide the expertise (on a temporary/part-time basis) to help you develop a program, to set up policies & procedures, and so on.  We'll gladly assist your staff (internal or external) with the actual implementation.
 
We'll define the roadmap and pace together. 

If you already have dedicated staff, of course we're happy to work with them too.

Risk Management

We look forward to working with you to design a risk management approach that addresses your specific needs, contextrisk exposure and maturity level. 
It doesn't matter of you're small or large, we'll adapt and we'll go as fast or as slow as you'd like.
Even if you already have a partner that handles your IT & Security services, it would still be valuable to bring in someone else, to get an objective view on things, and to double-check if - in reality - everything is as good as you think it is. 
Or perhaps you just want to adopt the best practise of rotating between companies to perform penetration tests & audits. Of course we're happy to be part of the rotation model as well.    

In any case, we're ready to help reduce your CyberSecurity risk exposure, allowing you to focus on your core business, enabling you to increase business risk in other areas of the company as needed to outsmart your competitors, to move faster than they can.                

That, too, is just common sense.   #pragmatic #commonsense

Risk Management

Together, we'll identify your specific risks and we'll devise a plan to mitigate them, with the use of technology, processes, and so on.

Of course we're happy to include systems running in the cloud as well.

Risk Assessment

We'll assess if your protection & mitigation controls are adequate, through vulnerability assessments, ethical hacking "penetration tests", or manual control reviews.
We also have experience with GDPR, and can pro-actively check if your systems are properly protected.  Better safe than sorry.

Program maturity review

We're more than happy to take an objective look at the maturity of your overall Governance (policies, processes, etc), and suggest improvements where applicable.

Contact us for more info

GDPR Audit

If you do business in Europe, you should be familiar with GDPR already.  The General Data Protection Regulation requires you to implement a set of processes & controls related with the handling and processing of personal data. 

As it is the case with many laws & regulations, it can be somewhat challenging to understand and to implement GDPR in the right way. Of course it makes sense to get assistance from a subject matter expert, someone who understands the legal background and implications
Quite regularly, we see that companies tend to 'outsource' the process to a legal council (who is in a good position to help with the legal side), and/or to an expert on implementing GDPR-specific processes and/or to their already existing IT supplier. At some point in the process, they decide to purchase some kind of application to assist with the administrative work. And they believe that's where the story ends.

Unfortunately, all too often, the preventative  IT controls & protection mechanisms that are needed to protect personal data, that are needed to prevent data breaches & data loss, are neglected and not checked on a regular basis.  In reality, a lot of people don't really know for sure if they are doing things in the right way or not.
If something goes wrong, (and especially if you were not following the rules, such as implementing "preventative measures"), the penalties can be quite severe.

Don't put your head in the sand! Better safe than sorry.

Don't worry - we can help !

We'll perform a review of your IT controls & protection mechanisms, verifying if they are adequate and if they will help you prevent breaches or data loss. 
Based on the audit, we'll indicate what you can do to improve. 

We can perform a basic review, and we can run a full audit as well. That's entirely up to you!


Click here to open the PDF brochure (Dutch) 
to get more details & pricing information.
 

Contact us for more info

Processes

Over the past 20 years, we've built significant expertise in developing & implementing numerous essential operational processes that will help you protect & secure your business.
In addition to the 4 examples listed below, we can also help with other processes, including problem management, preventative IT system maintenance program, etc.   

Contact us to discuss further

Change Management

IT Change management allows you to control IT changes, avoiding that a change to your systems would stop your business

Incident Management

Incident Management defines the process related with the handling and escalation of incidents

Vulnerability Management

Vulnerability Management defines the process around vulnerability detection, vulnerability scanning and remediation.

Business Continuity

We can help you create a business continuity plan, allowing you to survive small & large disasters that would otherwise cause significant damage to your business.

Secure IT Architecture

One of our key strengths is our unique ability to combine 20 years of real-life hands-on experience with ICT Infrastructure and Security, in a private production company.  We know how to get things done in a pragmatic and secure way. 

Contact us for more info

Architecture design

We can help you to review your existing network & systems topology, looking for strengths and weaknesses.  We can help you create a roadmap for technological improvements. Or give you a second opinion about an already made design.   

Of course, security is always in our mind. #commonsense

Security Components

We can help you secure your networks and assist you with the implementation of security components (firewall, internet access filtering, remote access, endpoint protection, etc)

Monitoring

Monitoring is one of the most important aspects of your ICT Infrastructure.  We can help you with various layers of monitoring (Network & System monitoring, AD, SIEM, Intrusion Detection, User behavior analysis, etc)

ICS / SCADA / OT / Industry 4.0

We take a methodological approach to managing and assessing risk, allowing you to secure your industrial environment and related systems in a systematic way, while enabling your business to use new forms of automation and technological advancements.

Security for Industry

Together with our partners, we've built substantial expertise in securing Industrial networks.

Contact us to discuss further
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.