Cybersecurity Services
1. Information Security Management Systems (ISMS) Certification
Cybersecurity Essentials Plus Certification
By a certified Lead Auditor CQI IRCA ISO/IEC 27001:2022
2. Information Security Management Systems (ISMS) Implementation
By a certified Lead Implementer ISO/CEI 27001:2022
3. Information Security Management Systems domain Work force
By a qualified Expert in Cybersecurity (ESD), Level 7 (EU) NSF code 326 – 16/12/2016 published in the Journal Officiel of 03/03/2017
- GRC (Governance, Risk and Compliance)
- Risk assessment, EBIOS RM
- ISSP (Information Systems Security Policy )
- BCP (Business Continuity Plan)
- DRP (Disaster Recovey Plan)
- Pentest (Penetration testing)
- Forensics (prevention, detection, and mitigation of cyberattacks)
4. CISO As a Service
Outsourced CISO (Information Systems Security Manager). An expert bound by strict professional ethics and respect for the law, ensuring choices and actions concerning cybersecurity.
5. DPO As a Service
Outsourced DPO (data protection officer) by an external, independent DPO in order to provide more credible collaboration between the organization and third parties, under the EU GDPR (General Data Protection Regulation).
6. Information Systems security training and awareness
The security threat is most often located inside the Company, when it is through ignorance or negligence of employees that cybercriminals operate.
Cybersecurity Expert Graduated IT-AKADEMY Lyon,
ASTON ECOLE IT By SQLI
EBIOS RM (CLUBEBIOS member as individual expert)
7. Vulnerability Assessment and Penetration Testing
Identifying vulnerabilities and weaknesses in systems, networks and applications:
Black box, White box, Grey box testing.
8. Web Application
Testing and evaluating web applications in order to identify vulnerabilities, ensuring security online presence.
9. Mobile Application Testing
Testing in order to safeguard mobile applications and protect users
10. Forensics
Processes and technologies for detecting and responding to cyber threats, security breaches, and cyberattacks.
11. Network Configuration and Diagnostic
Assessing network configurations in order to ensure they are optimized for security, stability, and efficiency.
12. Firewall Configuration and Diagnostic
Reviewing firewalls configurations in order to enhance organization’s defence against cyber threat
13. Cloud Security Assessment
As more businesses move to the cloud, we provide audits in order to protect your data and assets in cloud environments.
14. Identity, access and privilege management
Identities Supervision and authorizations control of internal and external acces