By: | 0 Comment | View: 4859

Do you have difficulties in passing your requirements in information security by your employees? Is the number of incidents caused by the non-respect of your security procedures concerns you? Did these incidents impact your compliance with laws and regulations? We propose to design and implement awareness campaigns on information security for employees to help them [...] Read More


By: | 0 Comment | View: 5055

As a PCI SSC QSA (Qualified Security Assessor), ATHENA TUNISIE supports your PCI DSS approach and offers the following services: PCI DSS Training: Key Concepts Requirements Implementation of Recommendations Support in the scoping study and defining the scope of your PCI DSS certification project Support in PCI DSS compliance and maintaining of your certification: Gaps [...] Read More
Do you need information security specialized resources? ATHENA offers you consultants who could reinforce your team and help you achieving your information security goals. Please feel free to fill in the form below with information about your need and your contact information. Education level Experience Certifications Requested competences Assignment localization Please fill the form below [...] Read More
Are your IT investments creating value ? Are your business processes taking full advantage of the information technologies you are using ? Is your IT strategy aligned with your business strategy ? Take advantage of our know-how in governance and strategy through the following services: IT governance diagnostic Implementation of IT governance best practices Development [...] Read More


By: | 0 Comment | View: 4479

In case of a disaster , would your business be recovered ? In how much time ? Are your potential losses estimated ? In order to ensure the continuity / quick and efficient recovery of your business in case of a disaster, we offer you the following services : Development of your Business Continuity Plan [...] Read More

Forensic Analysis

By: | 0 Comment | View: 4974

In case of a security incident or a cyber-attack , do you need to retrace what happened and know how to react ? Our forensic analysis team addresses potential security incidents as well as malicious cyber-attacks via the following services : Trackback of the cyber-attack or the security incident Collection and preservation of relevant evidence [...] Read More


By: | 0 Comment | View: 5187

Do you need a third-party independent, neutral and objective review and analysis of your technical and/or strategic choices related to your information security ? We leverage our extensive knowledge of the IT security field to offer you the following services : Consulting Development/review of security policies Risk Analysis Secure architecture design Technical and technological study Technical and technological [...] Read More


By: | 0 Comment | View: 5727

What is the security level of your information system? Does it meet your business needs? We propose to evaluate the security level of your Information system through customized audits that meet your business needs, your budget, and your technical and operational constraints. Our audits can target technical, functional  and / or organizational components of your Information [...] Read More