DATA PROTECTION, MANAGEMENT AND CARE ARE ESSENTIAL FOR AN EFFECTIVE IT GOVERNANCE SYSTEM
CYBER SECURITY
VULNERABILITY AND SECURITY
INTERNAL AND EXTERNAL ADVANCED INTRUSION TESTING
WIRELESS NETWORKS SECURITY ANALYSIS
PHISHING CAMPAIGN
RISK MATRIX
INFORMATION SECURITY POLICY
IT ASSESSMENT MATURITY ANALYSIS OF IT PROCESSES
Evaluate maturity levels through benchmarking and company practices in relation to industry, international standards and guidelines. The maturity model is the measure that enables an organization to classify the maturity of it processes, which can go from non-existent (0) to optimized (5)
PMO - IMPLEMENTATION AND INTEGRATION OF SYSTEMS
Run project management of implementation and integration of systems, according to the PMBOOK and SCRUM methodology, from its conception, sponsors and planning while identifying risks, areas of impact, mapping and interdependencies of involved areas
ROBOTIC PROCESS AUTOMATION (RPA)
Development of RPA (Robotic Process Automation) projects, focusing on optimizing business processes, seeking to maximize operational efficiency and to reduce costs, increasing the integrity, agility and accuracy of the information carried over and processed in the company’s internal processes and controls
DRP – PCN/BIA
Carry out business continuity and disaster recovery plan according to NBR 15.999 and NBR ISO 22301, considering the strategic and operational aspects for the preparation of BIA (Business Impact Analysis), with analysis of risk and processes for the preparation of the plan
DATA GOVERNANCE/DATA MANAGMENT
Advice in the evaluation of data with focus on reducing the risks of information deterioration and construction of sanitized registry databases, creating standardization and information integrity, as well as defining and implementing data governance processes
DATA GOVERNANCE POLICY
Elaboration of Policy and Data Governance procedures, following the pillars below: