ISO 27001, Risk Management, Processes, Policies, Guidelines ISO 27001, Risk Management, Processes, Policies, Guidelines

ISO 27001, Risk Management, Processes, Policies, Guidelines

Today, most information is stored and processed using information technology. In addition, business processes in companies are usually highly dependent on well-working IT systems. Identifying and assessing the risks resulting from the use of information technology and attaining the desired level of protection requires professional information security management. It must be supported by the executive management, lived as a process throughout the company and integrated into the corporate security system.

Overview of the services we offer in information security and risk management:

  • Planning and implementation of the ISMS
  • ISMS evaluation and analysis
  • Preparation for certification in accordance with ISO/IEC 27001
  • Risk management
  • Trainings and awareness programs