Information Security Consulting

Our solutions are vendor-independent, so we can tailor them to our customers’ needs.

Future-proof information security

The value of companies’ information assets and the number of attacks are constantly increasing. This is also increasing the regulatory expectations that companies must meet, and the reason why an effective, comprehensive, risk-proportionate security system must be established and maintained within organizations.

As Information Security Consultants, we assess and prepare our client’s security systems for tomorrow’s challenges. Our solutions are vendor-independent, so we can adapt to the capabilities of our clients. We assist in answering emerging information security management and technical questions from the corporate strategic level to the operational assets.

Our colleagues have several decades of professional experience acquired from working for leading domestic companies in the following areas:

Risk management

  • Assessing and managing information security risks

  • Designing and implementing protection systems and implementation

Compliance

  • Situation assessment/preparing GAP analysis

  • Creating and fine-tuning Security Policies

  • Compliance audits, preparation for certification (ISO27001, MNB audit, Hunguard audit, GDPR.)

Security management

  • Acting as outsourced Chief Information Security Officer (CISO)

  • Security Awareness Training

  • GDPR security questions, data classification

  • Auditing suppliers

  • Cloud Security Management

  • Security support of business and IT projects

Information Security Solutions and Controls

  • Business Continuity Management (BCM)

  • Security Information and Event Management (SIEM)

  • Identity and Access Management (IAM)

  • Data loss prevention (DLP)

Preparation of NIS2

  • Testing of scope and supporting the notification process to authorities

  • Classification

  • GAP analysis

  • Preparing action plans

  • Developing a suitable control environment

  • Audit support

Preparation of DORA

  • GAP Analysis

  • Reviewing supplier contracts of outsourced services

  • Preparing action plans

  • Preparation support

PCI DSS and 3DS

  • Creation the conditions for PCI DSS / 3DS

  • Defining scope, Gap analysis

  • Planning and supporting of remediation tasks

  • Certification support

Partners