To ensure information security, it is necessary to control all security layers around the company's data and protect all potential gaps that an attacker could exploit. Several security standards exist for this type of security.
To determine the differences between the existing state and the desired standard, we use GAP Analysis. Via GAP Analysis, we find out detailed information about the current state and identify differences and weak points in relation to the defined requirements. The GAP Analysis output includes the prioritization of identified deviations and shortcomings.
Risk Analysis is a systematic approach to threat assessment, vulnerability detection, and risk identification. Risk describes the degree of probability that a negative event will occur and defines its impact on the company's assets.
This analysis aims to determine what is vital for the company, the level of threat tolerance, and prepare the foundation for strategic, management, and control processes. It is a fundamental tool of the information security management system, which provides the organization with an effective means for the qualified determination of priorities in the field of information security at the strategic and operational levels.
The forensic analysis aims to reveal the penetration method, scale of the damage to the systems, and identify what data has been lost. The delivery usually consists of server logs and network analysis to determine the attacker's initial vector of attack and movement; following up with an in-depth analysis of artifacts left by the attacker (malware) and extraction of forensic evidence for law enforcement. Binary Confidence can provide a court-recognized witness analysis and statements that are often needed in ICT security-based litigations.
Binary Confidence can help you with the following standards:
Decree of Czech Central Bank # 123/2007 Col., 163/2014 Col., PCI DSS., Pharma industry, FDA GxP., Telco ICT industry, Act no. 127/2005, Col. (data retention), ISAE 3402., Critical infrastructure, Act no. 181/2014 Col., inc. Decrees, SCADA Security standards., Content responsibility and intellectual properties, Act no. 121/200 Col., Acts no. 40/2009 Col. & 418/2011 Col.
Microsoft Exchange je pomerne rozsiahlo rozšírené a obľúbené riešenie emailového servera, ktorý umožňuje organizáciám akejkoľvek…
09. 10. 2020Ukradnuté údaje o vakcíne proti koronavírusu môžu pomôcť konkurencii. Hackerský útok však okrem toho môže spomaliť aj jej vývoj. To by mohlo mať zásadný vplyv na krajiny, ktoré bojujú s prepadom ekonomík a druhou vlnou ochorenia COVID-19. Aspoň proti fiktívnym kyberzločincom sa však postaví silný súper – účastníci súťaže Guardians 2020.
09. 03. 2020Dostali ste už list Národného bezpečnostného úradu? Ak nie, a ste takzvaný poskytovateľ základnej služby, môžete…
09. 03. 2020Hackeri sa dokážu nepozorovane pohybovať v nezabezpečených systémoch aj mesiace. V prípade, že využijú vašu…
Binary Confidence s.r.o.
Špitálska 53,
811 01 Bratislava
Slovak republic