End to End Cyber and Data Protection Management

Strategie, roadmap, processi e soluzioni per il governo dei rischi cyber asservendo gli obiettivi di business e di compliance

ISMS, NIST and ISO Standards, Policy and Procedures

GRC, Cyber Risk Assessment and Mitigation

PSNC, Golden Power, NIS, ENISA

BCM, DR, Service Continuity and Resiliency

Maturity Assessment, Roadmap and Transformation Program

Scouting, Benchmarking, Requirements, PMO

Design, Evolution, Improvement, Training, Awareness initiatives

External CISO as a Service

Cyber
Trust

Framework, Analysis, Malicious Campaign, Remediation

IT/Business Process Outsourcers Risk Governance, External Audit on Suppliers

VAPT, Code Review, Config Analysis

Capability and Operation Modeling, Standard and Guidelines, Incident Process Review

DPR, DPIA, Privacy Process Engineering, DPA, Consent Management

Privacy Engineering of Customer Value Management, Enhanced Profiling and Analytics

Privacy Engineering of Data Catalog and Data Management tools

Privacy Specialistic Support, Audit and DPA Inspection Simulation