IT security consulting

  • Fulfilling the role of Information security officer
  • Preparation for and accomplishment of IT audits
  • IT risk analyses
  • Preparation and verification of regulatory elements

Technology audits

  • Ethical hacking
  • Firewall audits
  • Hardening assessments
  • Source code analyses

Road to Data Privacy

  • Gap Analysis
  • Preparation of policies and informational materials
  • Fulfillment of the DPO role
  • General consultancy