Integral Security Assessments

For a thorough security analysis of your processes, organization, and the setup of your ICT, you are at the right place with us. Through a compact questionnaire and interviews, we help you gain insight into the resilience of your organization. This includes focusing on resilience against ransomware and business email compromise (BEC).

It is also possible for us to conduct due diligence research on your suppliers, partners, or acquisition candidates.

The possibilities

In this research, you can choose to touch on every topic or only specific ones. For instance, if you want to focus more on ransomware, we scope the research accordingly. Or, if you want to know more about your resilience against business email compromise (BEC), we focus on that. You can also opt for us to complete the questionnaire based on documentation and interviews.

The result is a clear and accessible report with a concise management summary, including visual representations of the results.

Due Dilligence

This option is best for conducting an investigation of your (prospective) supplier, partner, or acquisition candidate. Based on a questionnaire and technical observations from the outside, we examine the security status of the organization you choose.

This way, you can make a well-informed risk assessment based on better information.

Do you want to enter into a collaboration with the right supplier? Then choose this option.

This research is in English.

Internal (standard)

Based on a questionnaire, we will conduct a integral investigation in the field of security. The answers provided by your organization, if necessary, will be deepened with an interview with one of your colleagues. We do this to ensure that questions are interpreted and answered correctly. We compile all this into a clear and understandable report that you can immediately start working with.

Do you want a sharp price and still an integral investigation? Then choose this variant of the service.

This research is in Dutch.

Internal (extended)

Do you prefer to provide documents that we will analyze for you? We can get to work with what you have documented in the area of information security. Of course, we enrich this step with interviews to ensure that you can make any additions to the documents you have provided. In this way, we ensure a complete and comprehensive picture of your organization and its security.

Do you want the investigation to be entirely conducted by us? Then choose this option.

This research is in Dutch.

Overview of due diligence investigation topics
  1. Laws, Regulations and Certifications
  2. Security Testing and Audits
  3. Encryption
  4. Recovery and Response
  5. Maintenance, Changes and Development
  6. Risks and Awareness
  7. Identity and Access Management
  8. Security and Hardening
  9. Logging and Monitoring
  10. Datacenter and Physical Security
  11. Security Operations
  12. Public statements and policies
  13. Known breaches and Cybersecurity incidents
  14. Quick Security Tests

The questionnaire consists of about 40 questions and is in English.

Overview of internal assessment topics
  1. Identity & Access Management
  2. Passwords, Keys & Secrets
  3. E-mail Security
  4. Endpoint Security
  5. Data Security
  6. Network Security
  7. Application Security
  8. Patch Management
  9. Vulnerability Management
  10. Backup & Recovery
  11. Logging & Monitoring
  12. Datacenter Security
  13. Security Organization
  14. Lifecycle Management
  15. Security Incident Response
  16. Business Continuity Plan
  17. Disaster Recovery
  18. Auditing & Testing
  19. Change & Configuration Management
  20. Vendor Risk Management
  21. Personnel Security
  22. Scam Prevention and Detection
  23. Security Awareness & Phishing Tests
  24. Personal Data Processing

The questionnaire consists of about 200 questions and is in Dutch.

If you want to know more about our services, please contact us by phone. Or simply send us an email, and we will contact you as soon as possible.

• • •