End to End Cyber and Data Protection Management
Strategie, roadmap, processi e soluzioni per il governo dei rischi cyber asservendo gli obiettivi di business e di compliance
Cyber Security Compliance Governance
ISMS, NIST and ISO Standards, Policy and Procedures
Cyber Risk Management
GRC, Cyber Risk Assessment and Mitigation
Cyber Regulatory Governance Model Engineering
PSNC, Golden Power, NIS, ENISA
Business and Cyber Resiliency
BCM, DR, Service Continuity and Resiliency
Cyber Security Strategy
Maturity Assessment, Roadmap and Transformation Program
Cyber Security Solution Modeling
Scouting, Benchmarking, Requirements, PMO
Security Process Engineering and Change Management
Design, Evolution, Improvement, Training, Awareness initiatives
External CISO
External CISO as a Service
Ransomware and Cyber Threats Readiness
Framework, Analysis, Malicious Campaign, Remediation
Supply Chain Risk Management
IT/Business Process Outsourcers Risk Governance, External Audit on Suppliers
IT/OT/IoT Cyber Testing
VAPT, Code Review, Config Analysis
CERT and SOC/SIC Design
Capability and Operation Modeling, Standard and Guidelines, Incident Process Review
GDPR Compliance Governance
DPR, DPIA, Privacy Process Engineering, DPA, Consent Management
Privacy enabling Business
Privacy Engineering of Customer Value Management, Enhanced Profiling and Analytics
Privacy and Data Management
Privacy Engineering of Data Catalog and Data Management tools
DPO Advisory and Operations
Privacy Specialistic Support, Audit and DPA Inspection Simulation