Role in the Digital Circle

  • Complete mapping of the digital information assets under your documentary responsibility
  • Identification mapping and classification of sensitive and personal data present
  • Targeted mapping to identify the elements affected during a security event
  • Upgrade mapping for governance and recovery plan

Legal services and
compliance with Act 64

Reputation management and crisis communication

Information Technology

Cyberinvestigations and penetration tests

Personal data management

Fraud prevention and
cybersecurity training