Cyber security

Advisory & Analisys

Companies response to cyber risk must shift quickly by abandoning the traditional view - only technical oriented - towards a large-scale and complete risk management discipline. We are in front of a real generational transformation that demonstrates how essential is to shift the information security focus from traditional technology models to business risk. To support this change, Obiectivo has developed a set of services in order to support customers to achieve this goal.

Each proposed

service

is customized

according to the type

of organization and its requirement.

In our vision every company represents a unique ecosystem with specificities that need

to be preserved and enhanced.

We believe that security must be an enabling element and certainly not a limit.

Strategic Advisory

Strategic advisory support for:
  • Cyber security strategy
  • Cyber Risk Quantitative Appetite
  • Quantitative Cyber Risk Analysis
  • Cyber Risk Management Framework
  • Qualitative Risk Analysis

Maturity & Compliance Evaluation

Support for Information Security Management System maturity level evaluation and accompany to the compliance with:
  • ISO/IEC 27001:2013
  • ISO/IEC 27002:2013
  • ISO 20000-1:2011
  • GDPR
  • Circolare 285 Banca d'Italia
  • CSA STAR
  • PCI-DSS 3.2
  • ISO 22301:2012
  • ANSI/ISA 62443

Vulnerability Evaluation

Knowing ourself is the first step toward understanding our "weaknesses" and to a trigger positive change. According to this principle, the security level control of your information system must be the first step toward correct and effective business plan definitin and continuous improvement process creation.
  • Vulnerability Scan
  • Penetration Test
  • Wireless Penetration Test
  • Web Application Penetration Test
  • Mobile Penetration Test
  • Code Review
  • Traffic Analysis
  • Brute Forcing

Other

A properly implemented and effective Security Management Sistem requires many aspects to consider, which sometimes reflect not only our specific perimeter of application but also the whole system which we interact with. For this reason we have developed specific services designed to oversee these aspects:
  • Supplier Assessment & Audit
  • Data ghost identification

Request

Information

Fill out the form below

Read More

PROTECT YOUR COMPANY