About Us
A team of experts in the field of information and cybersecurity management and information protection with years of experience:
-
in the areas of certification, auditing, security risk analysis, setting up information and cybersecurity management processes, identifying security roles, and providing support in managing and resolving security incidents,
-
with various types of clients ranging from small organizations, through medium and large private companies, to large technological organizations,
-
with a wide range of technologies of various sizes and information systems, including OT systems,
-
collaborating with the state administration and the sectors of Public Administration, Healthcare, Transport, Energy, Banking, Water and Atmosphere (Water structures and Drinking water supply),
-
working on projects in the aforementioned organizations, where we also acted as invited experts,
-
in the field of research and development, including working in cybersecurity innovation laboratories,
-
in the field of education and conducting various types of training, including lecturing at universities (e.g., Slovak University of Technology in Bratislava and University of Žilina).
Certificates and Awards
We hold certificates, primarily:
- Certified Cybersecurity Auditor
- Certified Cybersecurity Manager
- CISA (Certified Information Systems Auditor)
- Lead Auditor for ISO/IEC 27001:2022
- Lead Auditor for ISO 22301:2019
- DPC Certificate under the GDPR
- DPO Certificate under the GDPR
- National Security Authority (NBÚ) clearance: "Confidential" level
- PRINCE 2 Foundation
- Cybersecurity Auditor of the Year 2025 Award (@Qubit conference)
Our Services
Performing security and expert roles:
- information security and cybersecurity manager,
- Data Protection Officer (DPO), or
- external support for the aforementioned roles,
- expert project team member in various types of projects.
Providing
- consulting, auditing, analytical, and expert activities in the fields of information security, cybersecurity, and personal data protection.
Execution of
- analyses of critical customer processes and business continuity planning, security audits, design of security measures (based on risk analysis conclusions), and management of their implementation process.
Our services also include:
- drafting security documentation (policies, standards, procedures, methodologies) in the fields of information security, cybersecurity, and personal data protection, and updating them according to legislative requirements and relevant standards,
- performing specific auditing and analytical activities such as:
- gap analyses,
- compliance assessment,
- security risk analysis,
- business impact analysis (BIA),
- analysis of security technology outputs,
- analysis of security processes and setting their metrics,
- access rights audit,
- audit of specific areas, such as an in-depth audit of firewall rules.
We provide comprehensive customer support in the areas of:
- information security management and ISO/IEC 27001 certification,
- preparation for an audit under Act No. 69/2018 Coll. on Cybersecurity and on Amendments to Certain Acts, and its implementing regulations,
- preparation for compliance with the requirements under Act No. 95/2019 Coll. on Information Technologies in Public Administration and on Amendments to Certain Acts, and its implementing regulations,
- personal data protection, including comprehensive preparation under the GDPR, along with the design and drafting of related documentation,
- employee training in information security, cybersecurity, and personal data protection,
- ensuring compliance with legislation falling under the NIS 2 Directive.
We provide support in the implementation and management of processes for:
- Information Security Management Systems (ISMS),
- Cybersecurity Management Systems (CSMS),
(for related areas - information asset management, information security and cybersecurity risk management, security and cybersecurity incident management, personnel security management, physical and environmental security, change management, access rights management, security monitoring and vulnerability management, business continuity management processes - BCM, including setting up BCP and DRP, etc.).
- personal data protection.
We provide training for management, employees, and suppliers
- Conducting training and educational programs in the fields of information security, cybersecurity, and personal data protection.
- Developing e-learning materials in information security, cybersecurity, and personal data protection for various user groups, such as information system users, information system administrators, cybersecurity specialists, cybersecurity personnel, organization management, etc.
- Creating and setting metrics for effective evaluation of training plans and raising employees' security awareness.
We provide consulting in the field of security technologies
- Proposing ways to utilize security technologies, creating processes and adequate outputs for their deployment, tuning, and usage (SOC, SIEM, Monitoring, Content Filtering, USB media, etc.).
- Security audits or analyses of various types of deployed systems or technologies (from small systems to DWH in the banking sector or OT technologies in the manufacturing or economic sectors).
We ensure monitoring of legislation and legal regulations, their amendments, and notification of changes to clients
- monitoring compliance with legislation and legal regulations of the Slovak Republic, with other EU legal regulations, and international standards relating to information security, cybersecurity, and personal data protection.