Risk analysis and cybersecurity documentation
We take care of your cybersecurity comprehensively – from identifying risks to creating clear and meaningful documentation. All in compliance with the new Cybersecurity Act, the DORA regulation, GDPR, and other requirements.
What do we offer?
Risk analysis using CSA
We use the Cyber Security Audit (CSA) tool by Gordic, which enables effective identification and assessment of:
- assets, threats, and vulnerabilities,
- impacts and likelihood of occurrence,
- overall risk level.
The outputs include proposals for specific measures as well as an overview of evaluation matrices.
Preparation of cybersecurity documentation
We prepare documentation according to your security level and obligation regime (higher / lower). The documentation typically covers:
- information security management system (ISMS),
- risk, asset, access, and supplier management,
- security roles and top management responsibilities,
- incident and business continuity management,
- application, network, and physical security,
- use of cryptographic means and identity management.
GAP analysis
We assess the current state of your organization’s security against required standards such as the new Cybersecurity Act, NIS2 Directive, GDPR, ISO 27001, and others. Furthermore, we:
- identify weak points,
- prepare specific recommendations,
- propose development steps to strengthen resilience.
Documentation according to DORA
Based on consultations, we prepare documentation and supporting materials to meet the requirements of the DORA regulation. The documentation includes:
- risk analyses and asset assessments,
- business continuity and disaster recovery plans,
- requirements for ICT service providers,
- adjustment and implementation of internal processes,
- assistance with preparing reports and future communication with the regulator.
Benefits cooperation
We provide this service in cooperation with experts from Gordic, who supply the specialized tool designed for conducting risk analysis in cybersecurity.
- We handle everything for you – from analysis to outputs and documentation
- We adapt to your specific needs and processes
- Our outputs comply with Cybersecurity Act, GDPR, DORA, and ISO 27001
- We have experience with both small and large companies across various sectors
Are you interested ?