GDPR Realisation Workshop

Give your GDPR project a flying start thanks to our GDPR Realisation Workshop!

Already started, but you need to overcome some hurdles (as we notice as well with our other customers)? Allow us to give your GDPR project a boost via a GDPR Realisation Workshop!

Well under way and the end is in sight, but now you need a Business requirements to IT translation? Let us help you based on our experience, expertise and solutions to provide you with more insights on how to achieve this.

Normally you do this once (a GDPR project), we do it continuously for our different clients. That way we build up knowledge that we like to share. Use this to your advantage!

Next an overview of the different topics that could be part of a workshop.

  • Background, history, and concepts of the GDPR legislation;
  • Highlighting the main principles;
  • Comparison with the current privacy legislation, and depicting the differences;
  • What is the impact of GDPR for your organisation;
  • Creation of the project plan, starting from our template, on how to approach the project;
  • Etc.

Typically we foresee a day for a workshop. But the time necessary depends on the selection of the topics.

By the end of the workshop, you’ll be aware of (among other things):

  • The GDPR principles;
  • The impact of GDPR on your organisation;
  • You’ll have a roadmap on how to make your organisation GDPR compliant;
  • There will be a translation of the business requirements towards IT.

Interested? Do not hesitate to contact us for more information regarding our GDPR Realisation Workshop.
Send us an email or call us on +32 3 450 67 89.

What's living on your network?

Meanwhile, everybody is familiar with Next Generation Firewalls. If not so, please contact us!

But what about Next Generation Intrusion Prevention Systems (NG IPS)?

NG IPS sets a new standard for advanced threat protection, integrating real-time contextual awareness, full-stack visibility and intelligent security automation. In short, NG IPS notifies of suspicious network traffic and takes action (block threats, apply application control, URL filtering and apply malware protection).

Now. Seeing is believing.

Please take a look at these three sample risk reports covering Advanced Malware risk, Network risk and Attack risk. Notice the details that it unveils and the possible countermeasures we can take.

Allow us to put in place a demo appliance -free of charge (value 2.850€)- in listening mode, and we will provide you with similar reports based on your environment. Click here for more info.

Interested? Contact us today, so that we help you enforcing higher security on your network tomorrow. Send us an email or call us on +32 3 450 67 89.

High-level assessment on your
information security environment

According to Forbes, Security expenditure will increase with 46% in 2015. How do you know your investing in the right tools, appliances,…? Are your ICT implementations saveguarded by the business requirements and processes? If not, please contact us.

To make sure that your new tools and appliances are surrounded by the appropriate processes we can provide you with a high-level assessment on your information security environment. We will use a Cronos Information Security Framework that is based on the ISO 27001 standard to identify possible risk areas in view of your business environment.
Based on a set of interviews and review of documents we will provide you with an information security audit report and practical governance guidelines.

Interested? Contact us today, so that we can help you to improve your information security management environment. Send us an email or call us on +32 3 450 67 89.

Test it, or someone else will

How would your people react when they receive a mail asking about their account names or passwords? Did you have the right support during the development lifecycle of your application? Did you ever dare to check how fast a normal user can gain admin access on servers holding sensitive data? Your AD might have had an operational health check, but did it ever get a security check? Who reviewed your network design or infrastructure architecture in the context of its overall security? Is your industrial network vulnerable to a breach? Is your network safe from the outside?

Some companies think about security. Few companies focus on security. Fewer companies test their security.

Are the keys to your kingdom secure? Ask us over, let's have a serious chat about your security and let's test it, before someone else does.

Interested? Contact us today, so we can help you improving your information security management environment. Send us an email or call us on +32 3 450 67 89.

Security information and event management (SIEM)

Privacy and security are closely related. For instance, organizations have the legislative duty to protect the personal data within their care with appropriate technical and organizational measures. The new upcoming European privacy regulation, the General Data Protection Regulation (GDPR), which is expected early 2016, will have a serious impact on those security requirements.

In order to be able to communicate data breaches, an organization needs to know that a data breach has occurred. The implementation of a SIEM tool is the technical solution of Cronos Security to detect security incidents (e.g. unauthorized access to sensitive repositories, changes in security configurations to critical systems, sensitive data leakage, etc.) in a timely manner.

Introducing SIEM into an organization is more than just enabling a tool. The current SIEM solutions are being sold as plug and play, and from a technological standpoint, this claim is correct. However, there is far more to a SIEM implementation than meets the eye.
With years of experience in both public, private and international organizations we can assess the scope and identify the difficult tasks and help your organization to properly introduce SIEM into its landscape.

Interested? Contact us today, so we can help you improving your information security management environment. Send us an email or call us on +32 3 450 67 89.

Data Domain Discovery Scan

Pinpoint and protect sensitive data.

Do you know where your sensitive data is located? Is this data safe? Is your data classified in different security classes with the appropriate governance around it? Are you sure that there is no dark data in your company that contains privacy sensitive information? If you don’t know the what-where-why of your data, it is virtually impossible to apply the appropriate policies and controls to protect it.

The exponential growth of data and its use make locating and getting insight in critical data throughout the enterprise a challenge. The need to comply with the latest regulations and minimize data risk adds to the challenge. Discover your data and get control.

Cronos Security can provide you a data domain discovery scan. In a non-intrusive way your data will be analyzed and percentage-scored for the different data classifications like PII (Personally Identifiable Information), PCI (Payment Card Industry), PHI (Personal Health Information), etc. If needed, these discovery mechanisms can be extended with your company specific classes. This data domain discovery scan will help you to identify your important data and allow you to take the appropriate measures.

Interested? Contact us today, so we can help you improving your information security management environment. Send us an email or call us on +32 3 450 67 89.

Contact us

Or visit usVisit us

  • Veldkant 33b
  • 2550 Kontich
  • T. +32 3 450 67 89