In the field of information security, we work broadly along the following steps, which of course depends on the systems and processes operating at the Client:
- IT security situation assessment
We will review existing IT security policies as well as unregulated, practice-based IT security processes. Interviews will be conducted as part of the situation assessment, based on which a GAP analysis will be carried out against the standard requirements.
- Definition and development of information security policy and strategy
We define the organisation's information security objectives in the light of current legislation, the place and role of the information security area in the organisation, and the strategic methods for achieving these objectives.
- Preparation of an information security policy
We record procedures that meet the requirements set out in standards and relevant legislation (e.g. Act L of 2013).
- Preparation of an IT Business Continuity Plan (BCP)
We define the processes that ensure the continuity of IT services in the organisation.
- IT Disaster Recovery Framework and Plan (DRP)
We will develop a policy for the IT tasks to be performed by the organisation in the event of a disaster, and assess the disaster recovery plans already in place for the services provided by the organisation.