What do we offer?

We provide comprehensive support in preparing for the implementation of the NIS Directive and meeting the requirements of the National Cybersecurity System Act (KSC). With our experience, your information system for providing critical services will comply with the requirements of the PN-EN ISO/IEC 27001 and PN-EE ISO 22301 standards.

We will conduct an audit and check if your organization meets the organizational and technical obligations of a critical service operator, and we will perform a risk analysis for the security of the provided service. We will identify, analyze, and assess risks that may have or may have an adverse impact on your organization’s cybersecurity and business continuity.

We have the necessary tools and expertise to verify whether your information security management system demonstrates the required resilience against actions that violate the confidentiality, integrity, availability, and authenticity of processed data or related services. With our support, you can be confident that you meet the requirements of the National Cybersecurity System Act.

Leverage our experience to raise your cybersecurity standards.

How do we work?

Zero audit

1. Zero audit

We will collect, analyze, and assess the current situation of your organization in terms of information system security. The audit will be guided by the requirements specified in the National Cybersecurity System Act, as well as ISO 19011, 27001, 27001, 22301 standards, and the cybersecurity process maturity assessment according to COBIT. We will apply documentation analysis, process observation, and interviews. Finally, we will present the findings, highlight non-compliance with requirements, provide recommendations, and outline the necessary organizational and technical changes.

Impact analysis and risk assessment

2. Impact analysis and risk assessment

We will identify the information systems essential for the uninterrupted provision of critical services, and determine the risk levels (including unacceptable risks) for these systems and the associated infrastructure. We will conduct a business impact analysis (BIA) in accordance with ISO 22301 and assess information security risks following ISO 31000 and ISO 27005. Additionally, we will design a detailed incident management process.

Documentation of the information security management system

3. Documentation of the information security management system

We will prepare a comprehensive report for your organization regarding the cybersecurity of the information system used to provide the essential service and protect the infrastructure. We will assess and update the operational and normative documentation you already use, adapting it to legal requirements and the specifics of your organization.

Training and workshops

4. Training and workshops

We provide training and workshops necessary for a proper understanding of risk analysis, security assessment, and KSC requirements. This will equip your cybersecurity team and information system administrators with practical knowledge on how to ensure the required level of security for the provided critical service. Each participant will receive a certificate and educational materials at the end of the training.

Let's talk about your project! Fill out the form

Why us?

Knowledge and experience

Knowledge and experience

Our team has gained extensive experience in implementing cybersecurity over many years through projects across various industries and organizations of different sizes.
Tailored services

Tailored services

We implement cybersecurity solutions tailored to the expectations and needs of your organization.
Favorable conditions

Favorable conditions

We will adjust the pricing and schedule for cybersecurity services to fit your budgetary capabilities.
We work as equals!

We work as equals!

We fully understand the goals and challenges of Polish organizations in the field of cybersecurity. We are a 100% Polish organization ourselves.

They trusted us

Cybersecurity risk analysis from our perspective