NL

FR

What can you expect from us :

 

We are offering you our knowledge and experience as a 'CISO as a service', so you can spend more time in running your business. We'll advice and help you to take the right decisions in cyber security and compliancy matters always in line with your company's needs. Whether your company is small in low tech activity or a medium size in a high tech environment, in any case we want you to be cyber autonome when we leave the building.

 

How do we operate :

First, we listen and have a talk ! 

If we want to provide you with the customized approach that you deserve, we need to know what you want.

After our talk, we will make you an offer. You can decide whether you want to continue with a part or the complete offer. We think it is important to move at your speed, respecting your budgets and priorities.

Once we reached an agreement, it is time for planning and action

More details about our approach and the services we provide can be found below.

When the contract cycle is finished and you still need help, we will start a new cycle.

 

 

 

Our Services

Setting the right scope

We talk and listen. That is the first thing we do because a tailored cyber security is one of the most important cornerstone of our approach. Every business has different cyber security & compliancy requirements.

We want to know,

  • what is important to you
  • what is your business about
  • where do need to compy with (NIS2, GDPR, ...)
  • what do you expect from us
  • what do your customer expect from you
  • what risks are you willing to take ... or not
  • ...

Assess & report

To have a correct view on your cybersecurity posture, we need to do a security assessment.

Depending on the size of your company and the activities you want to assess, different assessment techniques can be used. 

The result of the assessment will be presented in a report showing the strong and the weak points of the protection of your data and IT-assets. 

This information is extremely valuable for an organisation and can be used to :

- build an information security strategy

- enhance the contracts with your 3rd parties (IT- and SW/HW providers)

- make an awareness and training plan for your employees

- prepare for certification (ISO 27001 or others)

- pinpoint the current risk you are running and prioritize actions to take

- enhance security on your own application

- ...

 

building an information security strategy

Whether you decide to define a complete strategy with us or just need some C-level advice on how to approach it. It doesn't matter for us. 

What matters is that you end up with a strategy that is fit for your company, not to heavy and not to lite.

Where you want to end up depends of a lot of factors :

- law & regulation

- your mission, vision

- risk you are willing to take

- customer needs

etc ...

implementing an Information Security Management System

An ISMS is a comprehensive framework that helps you to ensure the safeguard of your data. It consist of feature like : 

- policies, standards and procedures

- Asset management

- an effective Risk management & assessements

- incident mangement

- training & awareness

- ...

it doesn't matter whether your a small or a big player, everybody who wants to keep its cyber security and compliance requirements under control, need some kind of an Information Management System (ISMS).

The size and the activities you decide to implement can defer depending on your needs. Therefore we do not offer a one size fits all approach.

 

 

awareness & training

The human being is for a hacker still the number One target to get to eventualy to your data, whether it is via a phishing mail, a simple phone call asking help, just a talk in the metro ... Or maybe they are counting on us to postpone that latst patch upgrade. 

Humans are the reason why businesses that invested vast amounts of money into security tools still get hacked. The economic of most hackers, is time to discover one small breach in your wall and the value of your data. Our job is to pospone that moment in time as much as possible.

Using an effective awareness plan, could buy your company the time it needs for hacker to give up and go for an easier pray.

This is the reason why we beleive that all cyber security should begin with human mindset, 'close the door when leaving your home'.

We will make a training program together and customise our awareness trainings to your business so that the trainees feel more involved.

Awareness training can be done in different ways :

- classroom

- webinar/video

- live phishing mail tests, with extra training when they fall for it.

- viking tours (walk by and spot weaknesses, leave a note)

- ...

It doesn't matter what form of awareness training we use as long helps to get the rigth mindset.

Any questions?  Or just want to know more ?

Don't hesitate to contact us.

Not another standard solution 

Today, protecting your data is not a nice to have, it is a must. Think about it, what if your data was stolen, compromised or not available as from ... NOW.

Will your company survive, and what impact will it have on you and your surroundings ?

Cybersecurity about being in business today and tomorrow, no matter what happens in between. It is about being prepared for whatever happens to your data. 

Some might think that having a decent cybersecurity is way too expensive for a small or medium-sized companies.

It doesn't have to be that way. We believe in the first place in a mindset and people, supported by the right choice of tools. No tool, expensive or not, is going to solve your problem without the correct mindset.

We would like to introduce cybersecurity into your company's DNA so that it becomes a habit, like 'closing the door when you leave home'.