End to End Cyber and Data Protection Management
Strategie, roadmap, processi e soluzioni per il governo dei rischi cyber asservendo gli obiettivi di business e di compliance
Regulatory Governance Model Engineering
PSNC, Golden Power, NIS, ENISA ecc.
Privacy enabling Business
Privacy Engineering of Customer Value Management, Enhanced Profiling and Analytics
GDPR Compliance Governance
DPR, DPIA, Privacy Process Engineering, DPA, Consent Management
DPO Advisory and Operations
Privacy Specialistic Support, Audit and DPA Inspection Simulation
Cyber Security Compliance Governance
ISMS, NIST and ISO Standards, Policy and Procedures
Cyber Risk Management
GRC, Cyber Risk Assessment and Mitigation
Business and Cyber Resiliency
BCM, DR, Service Continuity and Resiliency
Supply Chain Risk Management
IT/Business Process Outsourcers Risk Governance, External Audit on Suppliers
Cyber Security Strategy
Maturity Assessment, Roadmap and Transformation Program
Cyber Security Solution Modeling
Scouting, Benchmarking, Requirements, PMO
Security Process Engineering
Design, Evolution, Improvement
Cyber Change Management
Training, Awareness initiatives
Ransomware and Cyber Threats Readiness
Framework, Analysis, Malicious Campaign, Remediation
Vulnerability Management
IT/OT/IoT Cyber Testing
VAPT, Code Review, Config Analysis
CERT and SOC/SIC Design
Capability and Operation Modeling, Standard and Guidelines, Incident Process Review