Advice and expertise 2020-07-28T09:22:40+02:00

Advice & risk analysis

ITrust brings its expertise in the accompaniment and assistance to the project management of a secure information system architecture, by addressing various points:

  • Study of the existing situation including functional and operational aspects
  • Technological and architectural study
Request a quote

Relying on a dedicated professional can ensure that you are in control of your architecture and your information system. ITrust assists and accompanies you in :

  • the drafting of specifications for the expression of security needs (recommendations and specifications)
  • assistance in defining and improving physical security (access) in correlation with the population and the different types of security zones defined
  • training of collaborators, administrators, users and stakeholders
  • implementation of mock-ups (proof of concept)
  • revision of legal references (IT charter, data confidentiality, regulatory compliance)
  • the implementation of a standard for naming and managing information system equipment (servers, switches, routers, etc.) in their life cycles (input/output of equipment) and in their use
  • setting up procedures for managing Service Level Agreements (identification, quantification, qualification of projects, monitoring and control)

Advice & project management assistance

The objective of ITrust’s project management assistance mission is to accompany you on :

  • the identification of information assets through a risk analysis process
  • the definition and implementation of relevant priorities in your security plan
  • the implementation of the IS security policy (structure, developments, dissemination)
  • communicating and promoting security policy internally

Studies & risk analysis

ITrust assists you by putting its know-how at your disposal through :

  • the use of multiple analysis methods (MEHARI, EBIOS…)
  • the global analysis of an information system (structural, functional, organizational and operational)
  • specific analysis in the context of a project or a segment of an information system (e.g. securing an extranet)
  • the study of the behavioural habits of the users of the information system
  • the study of risks applicable to the information system and business applications

Definitions & planning your security

ITrust puts at your disposal its know-how on :

  • the organization and editing of security precepts within the entity
  • the implementation of operational procedure documents: security dashboard (TBSGSSI), definition of qualitative and quantitative criteria, reporting, management of the life cycle of security policies
  • security policy charters: assistance with the implementation of charters, drafting and updating of documents, control of confidentiality and deliverables
  • assistance in the implementation of security within the company: identification of the responsibilities of the different populations within the company, training and awareness raising on the different aspects of security, support in the compliance and deployment of security policies.
Request a quote