Information and cyber security in the hands of professionals . . .
The Cyber Security Act
The Cyber Security Act and implementation of its requirements into practice.
NIS2
EU's NIS2 directive will soon become a part of CZ Cyber Security Act and will bring about a number of changes. These changes will result in a growing number of firms required to abide by this act and fulfill the required security measures.
Business Continuity Management
BCMS, BIA, DRP, and more. These are only some of the abbreviations standing for a systematic approach that needs to be grasped correctly.
Security Training
Security awareness training for employees as well as top management, organizing cyber security tabletop exercises, …
CISO
Chief Information Security Officer (CISO) is a mandatory role in the cyber security field. This role is provided to our clients in the form of a service. We also offer guidelines to help with a slow transition to the cyber agenda and transfer onto the (future) internal employee.
Cyber security architect
Cyber security architect is a mandatory role in the cyber security field responsible for cyber security architecture. This role is provided to as a service to our clients. We also offer guidelines to help with a slow transition to the cyber agenda and transfer onto the (future) internal employee.
Risk management
Risk management is a crucial process in the scope of ISMS as well as the Cyber Security Act. Our approach is not only theoretical but also practical with a focus on bringing added value to the organization. We can also help our clients implement various supportive risk management tools.
OT security
OT security is security in the area of industrial control systems. We will help you with all that is needed to ensure security in this field–regulatory compliance, OT security awareness, infrastructure security, management of vulnerability and patching, or hybrid SOC consultation.
Security monitoring, incidents detection, and incident management
We will help you with technologies and processes in the areas such as log management, SIEM, EDR, XDR, SOAR, IDS, IPS, …
Security projects
We also offer other relevant consulting and support related to security projects, such as ISMS implementation, compliance with cloud regulations, or preparing RFP for security technologies.
ISMS
Information Security Management System (ISMS) according to ISO/IEC 27k standards. We will ensure the implementation of ISMS as well as preparation for ISO/IEC 27001 certification if needed.
CyberSecurityPlatform.cz
We care for building a community of security experts called CyberSecurityPlatform.cz. We aim to share know-how and experience at an expert level. See more on www.cybersecurityplatform.cz