Information Security Consulting
Our solutions are vendor-independent, so we can tailor them to our customers’ needs.
Future-proof information security
The value of companies’ information assets and the number of attacks are constantly increasing. This is also increasing the regulatory expectations that companies must meet, and the reason why an effective, comprehensive, risk-proportionate security system must be established and maintained within organizations.
As Information Security Consultants, we assess and prepare our client’s security systems for tomorrow’s challenges. Our solutions are vendor-independent, so we can adapt to the capabilities of our clients. We assist in answering emerging information security management and technical questions from the corporate strategic level to the operational assets.
Our colleagues have several decades of professional experience acquired from working for leading domestic companies in the following areas:
Risk management
- Assessing and managing information security risks
- Designing and implementing protection systems and implementation
Compliance
- Situation assessment/preparing GAP analysis
- Creating and fine-tuning Security Policies
- Compliance audits, preparation for certification (ISO27001, MNB audit, Hunguard audit, GDPR.)
Security management
- Acting as outsourced Chief Information Security Officer (CISO)
- Security Awareness Training
- GDPR security questions, data classification
- Auditing suppliers
- Cloud Security Management
- Security support of business and IT projects
Information Security Solutions and Controls
- Business Continuity Management (BCM)
- Security Information and Event Management (SIEM)
- Identity and Access Management (IAM)
- Data loss prevention (DLP)
Preparation of NIS2
- Testing of scope and supporting the notification process to authorities
- Classification
- GAP analysis
- Preparing action plans
- Developing a suitable control environment
- Audit support
Preparation of DORA
- GAP Analysis
- Reviewing supplier contracts of outsourced services
- Preparing action plans
- Preparation support
PCI DSS and 3DS
- Creation the conditions for PCI DSS / 3DS
- Defining scope, Gap analysis
- Planning and supporting of remediation tasks
- Certification support