
CYBER AUDIT IS THE FIRST STEP OF CREATING A CYBER PROTECTION SYSTEM
An audit of the information management system and provision of information security and cyber protection includes:
- Determining the scope of application of the Information Security Management System (ISMS) and cyber protection, developing an information security policy and determining the method of assessing cyber risks (information security risks) used in the Client’s company.
- Identification, analysis and assessment of information security risks, identification and assessment of risk treatment options in the Client’s company.
- Defining control objectives and safeguards for risk treatment, management approval of residual risks, and review of the “Statement of Applicability”.
- Development, implementation and maintenance of the functioning of an ISMS and cyber protection in a company/bank.
- Continuous monitoring and review of the ISMS.
- Continuous support and improvement of company’s ISMS.
- Creating documentation and protocols of company’s ISMS.
- Defining Management responsibilities.
- Routine regular ISMS internal audits executed by company’s Management.
Our company offers its clients the entire range of services listed above. The specialists we partner with have proven their competence and high professionalism by working with some of the world's largest companies, primarily in European countries.






