We help you get to grips with your current stance on security, in order to refine metrics and make targeted investments.
We help you bridge the gap to reach your desired security maturity, through solutions that we custom design.
We support you throughout the experience, building solid project foundations and streamlining your implementation activities.
We keep at it, working steadily on your challenge and looking ahead to evolutions in the cyberenvironment landscape.
IoT device PKI implementation
Design and implementation of an overarching PKI for different device families and generations with different managed PKI service providers.
Large Scale SIEM Implementation
Technical project management to implement a Security Information and Event Management (SIEM) platform based on IBM QRadar
Password Management Harmonization
Project management for the implementation of a harmonized global password and credential management solution
OT CYBERSECURITY STRATEGY
Design of a comprehensive and risk-based OT cybersecurity strategy for more than 80 global and highly diverse manufacturing sites.
OT SOC Implementation
Design and implementation of a Security Operation Center focusing on the production environment of a major pharmaceutical company.
Manufacturing Security Program
Design and implementation of a cyber security improvement program focusing on the manufacturing sites of a major pharmaceutical client.