Advice & risk analysis

ITrust brings its expertise in the accompaniment and assistance to the project management of a secure information system architecture, by addressing various points:

  • Study of the existing situation including functional and operational aspects
  • Technological and architectural study

Relying on a dedicated professional can ensure that you are in control of your architecture and your information system. ITrust assists and accompanies you in :

  • the drafting of specifications for the expression of security needs (recommendations and specifications)
  • assistance in defining and improving physical security (access) in correlation with the population and the different types of security zones defined
  • training of collaborators, administrators, users and stakeholders
  • implementation of mock-ups (proof of concept)
  • revision of legal references (IT charter, data confidentiality, regulatory compliance)
  • the implementation of a standard for naming and managing information system equipment (servers, switches, routers, etc.) in their life cycles (input/output of equipment) and in their use
  • setting up procedures for managing Service Level Agreements (identification, quantification, qualification of projects, monitoring and control)

Advice & project management assistance

The objective of ITrust’s project management assistance mission is to accompany you on :

  • the identification of information assets through a risk analysis process
  • the definition and implementation of relevant priorities in your security plan
  • the implementation of the IS security policy (structure, developments, dissemination)
  • communicating and promoting security policy internally

Studies & risk analysis

ITrust assists you by putting its know-how at your disposal through :

  • the use of multiple analysis methods (MEHARI, EBIOS…)
  • the global analysis of an information system (structural, functional, organizational and operational)
  • specific analysis in the context of a project or a segment of an information system (e.g. securing an extranet)
  • the study of the behavioural habits of the users of the information system
  • the study of risks applicable to the information system and business applications

Definitions & planning your security

ITrust puts at your disposal its know-how on :

  • the organization and editing of security precepts within the entity
  • the implementation of operational procedure documents: security dashboard (TBSGSSI), definition of qualitative and quantitative criteria, reporting, management of the life cycle of security policies
  • security policy charters: assistance with the implementation of charters, drafting and updating of documents, control of confidentiality and deliverables
  • assistance in the implementation of security within the company: identification of the responsibilities of the different populations within the company, training and awareness raising on the different aspects of security, support in the compliance and deployment of security policies.