NIS risk management service
Egyszeri csomag frissítés nélkül
NIS2 dokumentációs csomag + frissítés
Dokumentációs csomag 1 éves frissítéssel
NIS2 dokumentációs csomag + térning
Dokumentációs csomag 1 éves frissítéssel + 1 nap kitöltési segédlet tréning
-
With the help of interviews, we assess the security of the organization's IT system and facilities
-
According to ISO 27005, we develop the documentation methodology and regulations of risk management
-
We carry out the risk analysis
-
We develop an action plan to reduce possible risks
-
We exclude risks that cannot be taken into account based on the operation of the organization, reducing the administrative burden
-
We look for the most optimal risk management method in terms of maintaining business operations
-
We make a proposal for the preparation of regulations
-
If possible, we recommend an administrative solution instead of costly additional investments
-
-
We document the results of risk management
-
We provide a regular review service
-
In case of possible damage to the system, we document the incident and support the documentation of the official notification
-
Fact-based decision making
-
Risk-based thinking

Biztonsági osztály megfelelés: Alap
-
With the help of interviews, we assess the security of the organization's IT system and facilities
-
According to ISO 27005, we develop the documentation methodology and regulations of risk management
-
We carry out the risk analysis
-
We develop an action plan to reduce possible risks
-
We exclude risks that cannot be taken into account based on the operation of the organization, reducing the administrative burden
-
We look for the most optimal risk management method in terms of maintaining business operations
-
We make a proposal for the preparation of regulations
-
If possible, we recommend an administrative solution instead of costly additional investments
-
-
We document the results of risk management
-
We provide a regular review service
-
In case of possible damage to the system, we document the incident and support the documentation of the official notification
-
Fact-based decision making
-
Risk-based thinking

Risk assessment
The risk analysis is performed in accordance with industry standards (ISO 27001, 27005, 31001). Accordingly, it also covers the following.
-
for the security of network and information systems and facilities,
-
to manage security incidents and
-
to ensure business continuity.
Risk management
Based on the risk analysis, the organization must also implement security measures commensurate with the risks.
-
Development of necessary regulations
-
Information security policy
-
Definition and documentation of the risk acceptance criteria of the risk analysis methodology.
Activities
-
With the help of interviews, we assess the security of the organization's IT system and facilities
-
According to ISO 27005, we develop the documentation methodology and regulations of risk management
-
We carry out the risk analysis
-
We develop an action plan to reduce possible risks
-
We exclude risks that cannot be taken into account based on the operation of the organization, reducing the administrative burden
-
We look for the most optimal risk management method in terms of maintaining business operations
-
We make a proposal for the preparation of regulations
-
If possible, we recommend an administrative solution instead of costly additional investments
-
-
We document the results of risk management
-
We provide a regular review service
-
In case of possible damage to the system, we document the incident and support the documentation of the official notification
-
Fact-based decision making
-
Risk-based thinking
Activities
-
With the help of interviews, we assess the security of the organization's IT system and facilities
-
According to ISO 27005, we develop the documentation methodology and regulations of risk management
-
We carry out the risk analysis
-
We develop an action plan to reduce possible risks
-
We exclude risks that cannot be taken into account based on the operation of the organization, reducing the administrative burden
-
We look for the most optimal risk management method in terms of maintaining business operations
-
We make a proposal for the preparation of regulations
-
If possible, we recommend an administrative solution instead of costly additional investments
-
-
We document the results of risk management
-
We provide a regular review service
-
In case of possible damage to the system, we document the incident and support the documentation of the official notification
-
Fact-based decision making
-
Risk-based thinking

Activities
-
With the help of interviews, we assess the security of the organization's IT system and facilities
-
According to ISO 27005, we develop the documentation methodology and regulations of risk management
-
We carry out the risk analysis
-
We develop an action plan to reduce possible risks
-
We exclude risks that cannot be taken into account based on the operation of the organization, reducing the administrative burden
-
We look for the most optimal risk management method in terms of maintaining business operations
-
We make a proposal for the preparation of regulations
-
If possible, we recommend an administrative solution instead of costly additional investments
-
-
We document the results of risk management
-
We provide a regular review service
-
In case of possible damage to the system, we document the incident and support the documentation of the official notification
-
Fact-based decision making
-
Risk-based thinking
