services – Athena Expert https://www.athena-experts.com The way to excellence Tue, 28 Jan 2020 18:42:41 +0000 en-US hourly 1 Awareness ../../../index/en/awareness-service/ ../../../index/en/awareness-service/#respond Tue, 11 Oct 2016 11:07:20 +0000 http://?page_id=1285

Do you have difficulties in passing your requirements in information security by your employees? Is the number of incidents caused by the non-respect of your security procedures concerns you? Did these incidents impact your compliance with laws and regulations?

We propose to design and implement awareness campaigns on information security for employees to help them become aware of the concepts and best practices. Below a non-exhaustive overview of our services:

  • Design and deployment of online campaigns of awareness of information security (see our offer outreach solutions)
  • Design and deployment of security awareness campaigns based information-face awareness sessions (with training of trainers)
  • Design and implementation of awareness campaigns on information security based workshops. This type of campaign follows a practical approach based on risk scenarios (simulation of security incidents management, demonstrations of computer attacks, etc.)
  • Design and implementation of awareness campaigns on information security based on visuals (posters, pop-up messages, videos, animations, etc.)
Quote request
]]>
../../../index/en/awareness-service/feed/ 0
PCI DSS ../../../index/en/pci-dss-2/ ../../../index/en/pci-dss-2/#respond Mon, 11 Apr 2016 15:28:04 +0000 http://?page_id=892

As a PCI SSC QSA (Qualified Security Assessor), ATHENA TUNISIE supports your PCI DSS approach and offers the following services:

  • PCI DSS Training:
    • Key Concepts
    • Requirements
    • Implementation of Recommendations
  • Support in the scoping study and defining the scope of your PCI DSS certification project
  • Support in PCI DSS compliance and maintaining of your certification:
    • Gaps identification
    • Policies and procedures development
    • Development of the technical specifications for the acquisition of compliance solutions
    • Implementation and test of compliance solutions
  • Recurring Audits of your PCI DSS scope:
    • External Penetration Testing
    • Internal Penetration Testing
    • Internal vulnerability scans
    • Wireless access points detection and identification
    • Firewall and router rule sets review
  • Mock Audit to prepare for PCI DSS certification
  • Certification audit
]]>
../../../index/en/pci-dss-2/feed/ 0
Consultant as a Service ../../../index/en/consultant-as-a-service/ ../../../index/en/consultant-as-a-service/#respond Tue, 28 Jul 2015 15:48:25 +0000 http://localhost/athena-expert/?page_id=280

Do you need information security specialized resources?

ATHENA offers you consultants who could reinforce your team and help you achieving your information security goals. Please feel free to fill in the form below with information about your need and your contact information.

  • Education level
  • Experience
  • Certifications
  • Requested competences
  • Assignment localization

Please fill the form below

Demande d'informations

[contact-form-7]
]]>
../../../index/en/consultant-as-a-service/feed/ 0
Governance and Strategy ../../../index/en/gouvernance-and-strategy/ ../../../index/en/gouvernance-and-strategy/#respond Tue, 28 Jul 2015 15:46:24 +0000 http://localhost/athena-expert/?page_id=271

Are your IT investments creating value ? Are your business processes taking full advantage of the information technologies you are using ? Is your IT strategy aligned with your business strategy ?

Take advantage of our know-how in governance and strategy through the following services:

  • IT governance diagnostic
  • Implementation of IT governance best practices
  • Development of the IT strategy
  • Business Process Reengineering
Quote request
]]>
../../../index/en/gouvernance-and-strategy/feed/ 0
BCB /DRP ../../../index/en/bcb-drp-service/ ../../../index/en/bcb-drp-service/#respond Tue, 28 Jul 2015 15:45:51 +0000 http://localhost/athena-expert/?page_id=269

In case of a disaster , would your business be recovered ? In how much time ? Are your potential losses estimated ?

In order to ensure the continuity / quick and efficient recovery of your business in case of a disaster, we offer you the following services :

  • Development of your Business Continuity Plan (BCP) and/or Disaster Recovery Plan (DRP)
  • Implementation of your BCP and/or DRP
  • Evaluation of the BCP and/or DRP efficiency and adequacy with the context of your organization and the enforced regulations
  • Optimization of the “Efficiency / Cost” rate of your BCP and/or DRP
  • Disaster simulation
Quote request
]]>
../../../index/en/bcb-drp-service/feed/ 0
Forensic Analysis ../../../index/en/forensic-analysis/ ../../../index/en/forensic-analysis/#respond Tue, 28 Jul 2015 15:45:26 +0000 http://localhost/athena-expert/?page_id=267

In case of a security incident or a cyber-attack , do you need to retrace what happened and know how to react ?

Our forensic analysis team addresses potential security incidents as well as malicious cyber-attacks via the following services :

  • Trackback of the cyber-attack or the security incident
  • Collection and preservation of relevant evidence
  • Intruders identification
  • Assessment of the damage extent
  • Protection against attack renewal
Quote request
]]>
../../../index/en/forensic-analysis/feed/ 0
Consulting ../../../index/en/consulting-service/ ../../../index/en/consulting-service/#respond Tue, 28 Jul 2015 15:43:38 +0000 http://localhost/athena-expert/?page_id=265

Do you need a third-party independent, neutral and objective review and analysis of your technical and/or strategic choices related to your information security ?

We leverage our extensive knowledge of the IT security field to offer you the following services :

Consulting

  • Development/review of security policies
  • Risk Analysis
  • Secure architecture design
  • Technical and technological study
  • Technical and technological advise
  • Information Security Management System (ISMS) implementation assistance
  • Chief Information Security Officer (CISO) assistance / coaching
  • Project management assistance
Quote request
]]>
../../../index/en/consulting-service/feed/ 0
Audit ../../../index/en/audit-service/ ../../../index/en/audit-service/#respond Tue, 28 Jul 2015 15:43:09 +0000 http://localhost/athena-expert/?page_id=263

What is the security level of your information system? Does it meet your business needs?

We propose to evaluate the security level of your Information system through customized audits that meet your business needs, your budget, and your technical and operational constraints.

Our audits can target technical, functional  and / or organizational components of your Information System.

Here are the various audits that we offer:

  • External / Internal / WiFi Penetration Testing
  • Application audit
  • Source code audit
  • Information Security Management audit
  • ISMS mock audit

 Penetration Testing

Penetration Tests aims to simulate the behavior of hackers and to use their techniques to push a system / technology / application / person to its limits in order to discover vulnerabilities.
These are some examples of penetration tests we perform:

  • External Penetration Testing (in blackbox)
  • Internal Penetration Testing (scenario based )
  • Application Penetration Testing (Web applications, mobile applications, etc)
  • Social engineering (targeted attacks, phishing, phone calls, contact-making, etc.)
  • WiFi networks Penetration Testing

The penetration tests are the most effective way to assess the solidity of your security measures against attacks.

Application audit

Application audits aim to assess the security of applications (web applications, mobile applications, etc.). During application audits we examine not only the audited application but also all its environment components:

  • Web server
  • Application server
  • Database Server
  • System Infrastructure supporting the application

The conduction of application audits is recommended before deploying applications in production environment. For in depth analysis of the security of your applications, application penetration testing and source code audit could also be integrated within the application audit.

Source Code audit

The source code audit allows you to check whether good coding practices have been respected during the applications development cycle. The audit of the source code is based on:

  • Automated testing through source code scanners
  • Manual source code review
  • Application structure analysis

Information Security management audit

Information security management audit aims to enlighten you about:

  • The application of your policies, procedures and security charters
  • The compliance of your security documents (policies, procedures, etc.) with the best practices
  • Your information security management improvement opportunities

Mock ISMS Audit

Mock ISMS audit is a requirement of the ISO / IEC 27001 and is part of its life cycle. It’s composed of the following elements:

  • ISMS documentation review (security policies, procedures and guidelines, risk management documents, etc.)
  • Identification of non-compliances related to the documentation
  • Identification of non-compliances related to the implementation of the policies, procedures and guidelines of the ISMS.
Quote request
]]>
../../../index/en/audit-service/feed/ 0