CyberDD

A due diligence for cybersecurity

A Digital Security Assessment is conducted to identify the vulnerabilities in the digitalization of a company before an attacker exploits them.

A highly efficient Digital Security Assessment team.

A due diligence for cybersecurity with threat analysis and worst-case scenario brainstorming.

A Digital Security Assessment is conducted to identify the vulnerabilities in the digitalization of a company before an attacker exploits them.

In order to assess the customer’s cybersecurity capabilities, Cyber DD is initiated and reviewed with a so-called GAP analysis that covers six main areas of the business that you can find to the right.

One day workshop

You get the tools to strengthen your digital security your self.

One week workshop

You get the tools to strengthen your digital security plus a report with strategic, tactical and operational advice.

Penetration test

We test your setup after you have done your home work.

Scope of a Cyber DD, six main areas:

Computers and mobile devices

Software

Networks

External IT services

User access and permissions

Training

One day workshop

A one-day workshop from 09:00 – 16:00 on-site*.

During the day you will get insight into your current Cyber Security status and guidelines how to proceed with your cyber security journey in a cost-efficient way.

  • Basic Threat analysis
  • Basic Worst-Case Study

One week workshop

During a week, we review your cyber security and measure this towards a standard.

We spend one week in total of our time during this period and schedule 2 occasions.

Includes:

  • Experts within
  • Cost efficient way to proceed
  • Based on standard well proven standard
  • Advanced Threat analysis
  • Advanced Worst-Case Study

Penetration test

When you have the basics in place or want to test specific parts of your organization and/or application, then we offer penetration test with different levels of effort depending on your requirements.

Scope of a penetration varies and depends on your specific needs.

  • Limited timeframe
  • Predefined Scope
  • A point in time technique for detection and response capabilities
  • Identifies problems related to system design and architecture
  • Static methodology
  • Commercial pentest tools are used
  • Employees are aware of the test
  • Testers take advantage of known vulnerabilities