What do we offer?
We provide comprehensive support in preparing for the implementation of the NIS Directive and meeting the requirements of the National Cybersecurity System Act (KSC). With our experience, your information system for providing critical services will comply with the requirements of the PN-EN ISO/IEC 27001 and PN-EE ISO 22301 standards.
We will conduct an audit and check if your organization meets the organizational and technical obligations of a critical service operator, and we will perform a risk analysis for the security of the provided service. We will identify, analyze, and assess risks that may have or may have an adverse impact on your organization’s cybersecurity and business continuity.
We have the necessary tools and expertise to verify whether your information security management system demonstrates the required resilience against actions that violate the confidentiality, integrity, availability, and authenticity of processed data or related services. With our support, you can be confident that you meet the requirements of the National Cybersecurity System Act.
Leverage our experience to raise your cybersecurity standards.
How do we work?
1. Zero audit
We will collect, analyze, and assess the current situation of your organization in terms of information system security. The audit will be guided by the requirements specified in the National Cybersecurity System Act, as well as ISO 19011, 27001, 27001, 22301 standards, and the cybersecurity process maturity assessment according to COBIT. We will apply documentation analysis, process observation, and interviews. Finally, we will present the findings, highlight non-compliance with requirements, provide recommendations, and outline the necessary organizational and technical changes.
2. Impact analysis and risk assessment
We will identify the information systems essential for the uninterrupted provision of critical services, and determine the risk levels (including unacceptable risks) for these systems and the associated infrastructure. We will conduct a business impact analysis (BIA) in accordance with ISO 22301 and assess information security risks following ISO 31000 and ISO 27005. Additionally, we will design a detailed incident management process.
3. Documentation of the information security management system
We will prepare a comprehensive report for your organization regarding the cybersecurity of the information system used to provide the essential service and protect the infrastructure. We will assess and update the operational and normative documentation you already use, adapting it to legal requirements and the specifics of your organization.
4. Training and workshops
We provide training and workshops necessary for a proper understanding of risk analysis, security assessment, and KSC requirements. This will equip your cybersecurity team and information system administrators with practical knowledge on how to ensure the required level of security for the provided critical service. Each participant will receive a certificate and educational materials at the end of the training.
Let's talk about your project! Fill out the form
What else do we offer?
We will help implement cybersecurity in your organization or its individual components. Check out our offer for other services related to cybersecurity.
Cybersecurity implementation
Learn about the service scopeCybersecurity audit
Learn about the service scopeVulnerability audit
Learn about the service scopeIncident management
Learn about the service scopeCyber support
Learn about the service scopeSupport in implementing NIS 2
Learn about the service scopeAssessment of the organization's readiness for implementing the NIS2 directive
Learn about the service scopeComprehensive NIS2 compliance consulting
Learn about the service scopeImplementation of DORA
Learn about the service scopeCybersecurity documentation
Learn about the service scopeCybersecurity consulting
Learn about the service scopeSupport for key service operators
Learn about the service scopeSupport for digital service providers
Learn about the service scopeCybersecurity training
Learn about the service scopeNIS2 directive: training for the board
Learn about the service scopeImplementation of DORA with ICT service providers
Learn about the service scopeTesting resilience according to NIS2
Learn about the service scopeWhy us?
Knowledge and experience
Tailored services
Favorable conditions
We work as equals!
They trusted us
Cybersecurity risk analysis from our perspective
What is cybersecurity risk analysis?
Cybersecurity risk analysis is required by law. It is essential for achieving compliance as a key service operator with the requirements of the National Cybersecurity System Act. The legal basis includes the regulation on the types of documentation related to cybersecurity for information systems used to provide key services (Journal of Laws 2018, item 2080) and the regulation on organizational and technical conditions for entities providing cybersecurity services and internal organizational structures of key service operators responsible for cybersecurity (Journal of Laws 2018, item 1780).
Who needs cybersecurity risk analysis?
The service is targeted at operators of essential services (OES), including entities providing services of critical importance for maintaining essential social or economic activities, such as service providers in the energy, transportation, banking, financial market infrastructure, healthcare, drinking water supply and distribution, and digital infrastructure sectors. According to the National Cybersecurity System Act, OES are required to implement cybersecurity documentation for the information system used to provide essential services, in compliance with the requirements of ISO/IEC 27001 and ISO 22301 standards, as well as to assess cybersecurity risks and implement appropriate safeguards.
Security auditors, IT security experts, managers, and specialists who deal with cybersecurity, risk management, or business continuity should particularly focus on continuously improving their skills in this area.
What is the scope of the cybersecurity risk analysis service?
The service includes checking vulnerabilities and threats in cyberspace, particularly the risk of attacks and damage to IT solutions and infrastructure. The risk analysis is divided into four stages, during which we conduct an audit to verify whether your organization meets the organizational and technical obligations of a critical service operator. We also perform an impact analysis and risk assessment concerning the security of the service. Finally, we prepare and update the documentation required by the National Cybersecurity System (KSC) Act.
What are the benefits of cybersecurity risk analysis?
The analysis is essential to develop a cybersecurity management process and documentation in accordance with the KSC Act and the Regulation of the Council of Ministers of October 16, 2018. Through the audit and subsequent recommendations, your organization will gain confidence that it meets the obligations of key service operators under the NIS Directive, the KSC Act, and the referenced standards. You will receive practical knowledge and methodology from us on how to manage crisis situations and assess the risk of cybersecurity incidents.
How much does a cybersecurity risk analysis cost?
The cost of a cybersecurity risk analysis depends on factors such as the size of the organization, the nature of its operations, the market environment, and the complexity of the processes involved. We provide a customized quote for each service, taking into account the scope and preferred timeline.
How long does a cybersecurity risk analysis take?
A cybersecurity risk analysis usually takes up to a few weeks, but it largely depends on the size of the organization and the specifics of the project. The implementation schedule is tailored to the individual needs and expectations of your organization.