Security
Table of content
“Ensuring a safe environment requires significant energy and knowledges. Surrounding yourself with an expert will save you a lot of time”
IT
- Safety audit
- Ethical Hacking
- Ensure compliance (ISO 17799, ISO 27001, CobiT, etc.)
- Compliance assistant for GDPR
- Risk analytics
- Security policy (directive, process, procedure, etc.)
- User awarness and training
- Business Continuity
- Legal back-up
- Etc.
Telecommunication
Corporate network
- Vulnerability tests
- Support in patches and there protections
Network operators
- Vulnerability tests
- Network capacity maintenance tests (bandwidth, operationalisation, redundancy, etc.)
- Support in patches and there upgrades
Sensitive networks
- Hospital
- Fire-brigade
- Rail network
- Police
- Military forces
- Public administration
Physical security
- Behavioural
- Penetration/Protection
- Visual surveillance
- Waves surveillance (radars, spectrometry, etc.)
- Eavesdropping/ counter-eavesdropping
- Security in public areas (airport, meeting and conference places, etc.)
- Security in penitentiary areas
Areas of expertise
- Risk analysis
- Security policy
- Awarness
- Analysis of mechanisms
- Analysis and protection of transported data
- Legal aspects of transported data