Risk management services

Risk management services

Adequacy LOPD / GDPR,
LSSI, ENS, PIC.

We help your organization in the implementation and maintenance of national regulations related to cybersecurity.

  • Support and consulting for the implementation or maintenance.
  • Implementation status audit.
  • Global implementation or maintenance service (turnkey service).

Professional services on the following national regulations:

  • Organic Law on Protection of Personal Data and Guarantees of Digital Rights (LOPDGDD)
  • General Data Protection Regulation (GDPR)
  • Information Security Services Law (LSSICE)
  • Intellectual Property Law (LPI)
  • National Security (ENS)
  • Critical Infrastructure Protection Law (PIC)
  • Others related to electronic administration, digital certificates and electronic signature, information systems and the protection of digital assets.

DPD / DPO Service (Data Protection Delegate)

The Data Protection Delegate or Data Protection Officer (DPD or DPO) becomes essential with the European Data Protection Regulation for private and public organizations.

With our service, they can outsource the figure of the DPD. We offer extensive experience in privacy and protection of personal data, both in the public and private sectors, which allows us to assume the functions of the Data Protection Delegate, ensuring correct compliance with the regulations, both at a legal and technological level according to what required by the GDPR (General Data Protection Regulation) and the LOPDGDD (Organic Law on Data Protection and Guarantees of Digital Rights).

Advantages of outsourcing the DPO

  • Comply with the GDPR and the LOPDGDD in a simple way.
  • Ensure adequate treatment of the data.
  • Minimize the risk of penalties.
  • Improve customer confidence.
  • Greater compliance by employees.
  • Cost savings.

Appropriateness ISO / IEC 27001, ISO / IEC 27035, NIST, PCI-DSS, SOX, GxP, HIPAA

We help your organization in the implementation and maintenance of international regulations and frameworks related to cybersecurity and good practices.

We can offer you this service in different formats.

  • Support and consulting for the implementation or maintenance.
  • Audits prior to implementation and obtaining the initial status.
  • Internal audits required by the regulations.
  • Global implementation or maintenance service (turnkey service)

Definition of security policies and processes

If your organization requires the implementation of security policies and / or processes, we help you or even take care of the entire process to achieve your objectives:

  • Security politics.

  • BIA (Business Impact Analysis).
  • BCP (Business Continuity Plan).
  • DRP (Disaster Recovery Plan).
  • FOP (Functions and obligations of the personnel)
  • DLP (Information Leak Prevention).
  • Other policies or plans on demand.