Home
Who we are
What & How we do it
Contacts
Blog
P2020
Home
Who we are
What & How we do it
Contacts
Blog
P2020
What & how we do it?
An holistic approach to
CONFIDENTIALITY | INTEGRITY | AVAILABILITY
Technology
Check how
Processes
Check how
Culture
Check how
Through Technology
IT Security Management
Protection! It’s all about prevention!
Security Architectures Evaluation and Analisys
Security Architectures Design
Security Controls
Trough Processes
Management Systems
Management! It’s all about governance!
Risk Management
Information Security Management
Data Privacy Management
Data Protection Impact Assessment
CSA – Cloud Control Matrix
Consultancy and Training
Training! It’s all about knowledge!
Risk Management (ISO 31000 | ISO 31010)
Personal Information Management (BS 100012)
Information Security Management (ISO 27001 | ISO 27002 …)
Privacy Impact Assessment (ISO 29134)
Privacy Framework (ISO 29100 | ISO 29010 | ISO 29109.2)
Business Continuity Management (ISO 22301 | 22313)
IT Service Management (ISO 20000-1 | 20000-2)
Trough Culture
Project Planning
Obtain support from customer’s organization management and assets
Behavioral Assessment
Drafting and submission of two separate questionnaires for managers / department officers and employees
Best Practises Assessment
Interview scheduling and execution, and evaluation report drafting related to requirements
Awareness Training and Workshops
Training and content building, awareness and clarification workshops regarding information safety
It's all about accessing and managing information at the right moment and for the right purpose
Contact us