Etek

Join ETEK on LinkedIn for top cybersecurity insights and updates.

Home > Services >  ASSEMENTS & AUDITS

Assesments & Audits

Evaluate efficiently the level of cybersecurity maturity against industry-recognized frameworks such as NIST, ISO, COBIT, standards such as PCI-DSS, GDPR or regulatory requirements that apply specifically to your industry.

Home > Services >  ASSEMENTS & AUDITS

Know strengths and weaknesses on the road to proactivity

Cybersecurity is not a one-time picture, it is a continuous journey of understanding, analyzing and adjusting to the business context, ensuring value creation and compliance.

S1

Context and coverage

Evaluate and compare the cybersecurity posture with industry standards or requirements that apply to the sector in which the organization operates.

S2

Unified control framework

Have a unified and efficient approach to the framework of control measures that transversally and cost-effectively ensure compliance.

S4

Visibility

Have metrics and indicators that clearly show, in business context, the organization’s cybersecurity and/or compliance posture.

arrow bg

How does ETEK support the achievement of these challenges?

Advisory services to evaluate applicable cybersecurity posture according to frameworks and best practices, generation of unified control model and management indicators, and generation of continuous strategic and tactical reports on the organization’s level of compliance.

Assessment results presented on the Netrum SITA platform.

Unified and disaggregated view in Netrum SITA platform of compliance status by practice, regulation and control with a view over time of the evolution of the regulatory position and compliance.

Netrum SITA platform reports

Assesment and audit results available for consultation and comparison on the Netrum SITA platform.

Unified control framework

Evaluations performed based on unified control frameworks that adopt best practices or particular regulations by industry type.

● Marco de controles unificados

Evaluaciones realizadas con base en marcos de controles unficados que adoptan mejores prácticas o regulaciones particulares por tipo de industria.

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book. It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s

FREQUENTLY ASKED QUESTIONS

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Assessments against international standards and frameworks such as NIST, ISO, COBIT , PCI , IEC62443, as well as international regulations such as GDPR , HIPPA or local by industry type.

An executive report and a detailed report summarizing the main strengths, findings and recommendations identified in the evaluation, centralized in the Netrum SITA platform, are delivered.

Industry-recognized models such as CMM, or C2M2 are used. In the same way, the use of any other particular model used by the client can be agreed upon.

0
Happy Enterprise Clients
0
MSS Projects
0
Skilled Security Experts
0
Years in Cybersecurity

Get in touch with us

Apply Now