IT security consulting
- Fulfilling the role of Information security officer
- Preparation for and accomplishment of IT audits
- IT risk analyses
- Preparation and verification of regulatory elements
Technology audits
- Ethical hacking
- Firewall audits
- Hardening assessments
- Source code analyses
Road to Data Privacy
- Gap Analysis
- Preparation of policies and informational materials
- Fulfillment of the DPO role
- General consultancy