Other Services

Other Services

We offer a comprehensive portfolio of defensive security services.

Whether it's consulting in cyber defense, auditing your current internal security systems, or training your employees in key security topics, we’ve got you covered.
other services

Cyber Defense

Get an overview of your network and have detailed information about its operation and status readily available in one place. At the same time, be able to quickly and comprehensively assess the situation and propose solutions from the comfort of your office in the event of an operational incident, using information from SIEM and SOAR.

SOC as a Service

The Security Operations Center (SOC) consists of a highly qualified team that is tasked with constantly monitoring and improving the security status of your organization while preventing, detecting, analyzing and responding to IT security incidents using technology, well-developed processes and expert human qualifications.

Incident Response

We provide incident analysis, advice on investigating the source of attacks and assistance in getting systems back up and running. We identify the method of breach and take measures to ensure it does not happen again. If you have been attacked, contact us immediately. We will help you repair the damage and return to normal operation.

Auditing and Consulting

Be prepared to comply with external or internal audits, legislative standards, and all security requirements of your company.

Whether you're starting out with cybersecurity or need to take it to the next level, it all begins with a consultation of your current state. Our experts help analyze your needs and propose an implementation plan that meets all legislative and security criteria.

 

  • Implementation of Security Management (ISMS according to ISO 27001), Business Continuity Management, or compliance with cybersecurity and privacy regulations.
  • Internal and external audits and compliance.
  • Risk management and analysis.
  • Security architecture.
  • Industrial security management according to IEC 62443 and similar standards.

Information security management requires a comprehensive approach and focus on the entire structure of an organization's information assets. From networks through end devices to applications and actual data in use. Risk analysis answers what needs to be protected and from what, allowing you to focus on how to achieve it.

Detailed analysis allows you to prioritize, so you can focus on the threats with the greatest potential impact and highest likelihood of occurrence first. This enables informed decisions and usage of efficient resources.

Our risk analysis prepares you to meet stringent legislative and process requirements for passing internal or external audits.

The role of a Chief Information Security Officer (CISO) is very important to a company’s cybersecurity. A highly professional CISO should have      a healthy mix of technical skills, strategic and managerial thinking, as well as knowledge of security standards and norms. Unfortunately, there is a shortage of such experts on the market, which is why we have introduced CISO as a Service.
 

Services usually include:

  • Assumption of security management.
  • Risk assessment (assets, vulnerabilities, threats).
  • Setting strategic security priorities.
  • Developing an implementation plan to mitigate risks.
  • Defining and selecting appropriate technical solutions.
  • Implementation process and technical measures.
  • Creating security policies, procedures and documentation.
  • Change management.
  • Conducting employee training.
  • Performing penetration tests.
  • Conducting internal and organizing external audits.

Training

We train your employees to help minimize the risk of cyber incidents.

training_2

Social Engineering & Basic Security for Employees

Capacity:

up to 25 people with direct interaction, over 25 with limited interaction

Duration:

3 hours

training_3

Internet Security Basics for Employees

Capacity:

up to 25 people with direct interaction, over 25 with limited interaction

Duration:

1 - 3 hours

training_1

Security Practices for Web Application Development – OWASP TOP 10

Capacity:

max. 10 people

Duration:

one-day seminar, two-day workshop

Citadelo Company Logo

Are you interested in boosting your company’s security?

Book a free 15 min. consultation call with us to find out how we can help you do that.

Book now

logo

Sign up for our newsletter for all the important cybersecurity and ethical hacking news.

Home

GDPR

Contacts

Code of ethics

News

© 2024 citadelo AG. All rights reserved.

facebooklinkedinxyoutube