sss

Blog

Awareness

By: | 0 Comment | View: 632

Do you have difficulties in passing your requirements in information security by your employees? Is the number of incidents caused by the non-respect of your security procedures concerns you? Did these incidents impact your compliance with laws and regulations? We propose to design and implement awareness campaigns on information security for employees to help them [...] Read More

PCI DSS

By: | 0 Comment | View: 946

Backed by its French partner QSA "Provadys" ATHENA supports your PCI DSS approach and offers the following services: PCI DSS Training: Key Concepts Requirements Implementation of Recommendations Support in the scoping study and defining the scope of your PCI DSS certification project Support in PCI DSS compliance and maintaining of your certification: Gaps identification Policies [...] Read More
Do you need information security specialized resources? ATHENA offers you consultants who could reinforce your team and help you achieving your information security goals. Please feel free to fill in the form below with information about your need and your contact information. Education level Experience Certifications Requested competences Assignment localization Please fill the form below [...] Read More
Are your IT investments creating value ? Are your business processes taking full advantage of the information technologies you are using ? Is your IT strategy aligned with your business strategy ? Take advantage of our know-how in governance and strategy through the following services: IT governance diagnostic Implementation of IT governance best practices Development [...] Read More

BCB /DRP

By: | 0 Comment | View: 640

In case of a disaster , would your business be recovered ? In how much time ? Are your potential losses estimated ? In order to ensure the continuity / quick and efficient recovery of your business in case of a disaster, we offer you the following services : Development of your Business Continuity Plan [...] Read More
In case of a security incident or a cyber-attack , do you need to retrace what happened and know how to react ? Our forensic analysis team addresses potential security incidents as well as malicious cyber-attacks via the following services : Trackback of the cyber-attack or the security incident Collection and preservation of relevant evidence [...] Read More

Consulting

By: | 0 Comment | View: 869

Do you need a third-party independent, neutral and objective review and analysis of your technical and/or strategic choices related to your information security ? We leverage our extensive knowledge of the IT security field to offer you the following services : Consulting Development/review of security policies Risk Analysis Secure architecture design Technical and technological study Technical and technological [...] Read More

Audit

By: | 0 Comment | View: 937

What is the security level of your information system? Does it meet your business needs? We propose to evaluate the security level of your Information system through customized audits that meet your business needs, your budget, and your technical and operational constraints. Our audits can target technical, functional  and / or organizational components of your Information [...] Read More