We can help you quickly and efficiently design and deploy an information and ICT security management system across your organisation. We have many years of practical experience in deploying it in a wide range of environments.
What is ISMS?
ISMS is defined by ISO/IEC 27001 (or the entire ISO/IEC 2700x family of standards) and is fully compatible with quality management systems (ISO/IEC 9001), environmental management systems (ISO/IEC 14001) or occupational health and safety systems (OHSAS 18001). Therefore, ISMS can be easily integrated into an organisation's overall management system.
- Determination of the optimal ratio between costs and the achieved level of security of the organization's information assets - maximum efficiency and precise targeting of security investments
- Increasing the credibility and credit of the organisation in the eyes of customers and partners
- Ensuring compliance with legislative requirements
- Reduction of risks related to unavailability of information and services, leakage or unauthorised access to the organisation's information
- Saving costs related to remediation of security incidents
- Minimising the risk of data leakage and protecting the stability of the organisation
- Increase employee security awareness - reduce user errors
- Continuous monitoring and evaluation of the current level of information security of the organization
In this area, we offer both design and documentation of these processes in the form of guidelines, procedures, methodologies, etc.
We communicate with clients and design/adapt processes and their associated documentation depending on the current processes, conditions and requirements of the client. This is undertaken to comply with the specified regulations/standards/legislation (e.g., ISO 27001, NIST, ZoKB, DORA, GDPR, etc.). In this process we also pass on our experience of practical implementation from the past or according to the latest trends in information security solutions.
We offer not only services related to the design of new or re-engineering of existing processes and their documentation, but also assistance with their implementation in the form of a security administrator who can supervise, control and implement individual processes according to their type. We also offer tailor-made training in this area, during which employees are familiarised with their new responsibilities or how the new processes should be carried out correctly.
We have the experience and can implement the entire scope of an ISMS, for any size and type of organization, but it is up to the organization to decide what part it needs and how detailed to implement with respect to its particular needs. So, we can help with just one process, or build the entire ISMS.
What services we offer in this area
We will advise, check and, if necessary, recommend options for the implementation of individual processes to meet your particular requirements.
We will analyse the conditions for the implementation of partial or given processes and propose/consult on changes and prepare process documentation to comply with the chosen standards.
We will focus only on the selected processes and, taking into account your specific conditions, possibilities and requirements, we will propose their course and document them accordingly.
We will perform the role of an internal employee who implements all or selected information security tasks.
Following the newly designed and described processes, we will prepare training for selected groups of employees who will be involved in the implementation of the processes.
The hardening policy has achieved the audit objectives and increased the security
Audits and sophisticated penetration tests for vulnerability identification for Škoda Auto
At T-Mobile, we performed security tests and audits
At L'Oréal, we took care of business continuity management.
At Deutsche Telekom (T-Systems), we cover the areas of cyber security.
Ensuring analysis and support of the supervisory center at Centropol Energy
Implementation of security audits and penetration tests for ČEZ
You May Also Like
- Robust multi-level user and data protection of Military Hospital Olomouc
- BUDVAR systematically increases its cyber security
- Kofola has cybersecurity under control
- Data of CENTROPOL ENERGY customers and employees is safe thanks to the DLP system
- The first four companies adopt the new name Aricoma
- Complete management of the corporate IT of MORAVIA PROPAG
- Modern and secure IT infrastructure with operational services for Arkance Systems CZ
- We have joined the EDIH NORTHEAST BOHEMIA consortium’s digitalization project
- Faster and safer login to computers and applications at the Jihlava Hospital
- Companies in KKCG's technology pillar are changing. Qinshift to be spun off from Aricoma
- Security and remote management of thousands of commissioners' mobile devices for Census 2021
- AC Identity - Identity Management for the city of České Budějovice
DO NOT HESITATE TO
Are you interested in more information or an offer for your specific situation?