For each ZIH user, it has an individualised approach depending on its needs. In accordance with this, we organize workshops with management teams and, with the expert guidance of our consultants and the application of world reference recommendations, we help users successfully implement processes of systematic information security risk management.
Consulting services that we can provide you with:
preparing approaches to information security risk management;
establishing an information security risk management process;
the choice of a method for managing information security risks;
developing a procedure for information security risk management;
carrying out the identification of information security risks;
carrying out an information security risk assessment;
advice on the selection of controls and ways to mitigate information security risks;
developing a framework of responsibility for information security risks;
consultations in the implementation of solutions into practice;
an information security risk management audit;
Preparation of GAP analysis of compliance with regulatory, legal and other regulations and standards.
For the purpose of better mutual understanding, we organise workshops through which we provide users with guidelines on how to:
understand and define the context of their company‘s operations;
identify all key stakeholders;
identify the information asset, its value and importance;
identify the vulnerabilities, threats and risks of their business;
recognise operational risks of the use of ICT.
Education in the following field:
Why and how to manage information security risks?
Certified ISO 27005 Foundation (PECB)
Certified ISO 27005 risk Manager (PECB)
Certified ISO 27005 led risk Manager (PECB)