An analysis of your network and IT and information security makes the cyber risks transparent; to help you get and stay in cyber control.
The starting points are: the organization, its IT users and an “open” work culture.
As a (cyber) security expert and system integrator, complex IT security issues are translated into practical IT security solutions; in clear and understandable language. The purpose of the scan is to make your organization resilient to (cyber) calamities.
Critical business processes and / or (information) systems are assessed on the value for your organization and on the sensitivity and dependence on IT support. To then arrive at well-considered choices and solutions based on business cases to protect people and process.
Attention is mainly focused on the existing technical installations or the information security around this equipment. The starting point will be compliance with the applicable cybersecurity requirements.