Information Technology (IT) Cybersecurity, Bureau Veritas

Information Technology (IT) Cyber security

With all the technology available today, both privately and professionally, we rely on information technology to manage our key business processes. New services are connected to the Internet, IT systems, software and networks, which makes the data vulnerable to security breaches. To alleviate this risk, Bureau Veritas will independently confirm that you (and your suppliers) meet cyber security regulations and standardized criteria. 

Hackers exploit vulnerable services, which means we can not live without information & communication technology (ICT). Security, protection and privacy are essential for all of us and for our business activities.

Cyber security has become a theme of compliance. In Europe, privacy is regulated by the General Data Protection Regulation (GDPR). Operators of Essential Services (OESs) and Digital Service Providers (DSPs) must comply with the EU Network and Information Security (NIS) directive.

Bureau Veritas provides necessary and independent cyber security services to assess and certify your company's IT systems through standards and services such as ISO 27001, ISO 27017 for Cloud Security, OWASP Guidelines, NIST Guidelines etc.

Our services in Information technology (IT)

Our services divided by People, Process and Technology

Image
People within Information Technology (IT) Cybersecurity, Bureau Veritas
PEOPLE
Security Awareness and Behavior (SAFE)
Phishing tests
Social Engineering
Training Courses (e.g. Cloud Security, Mobile App Security, Hands-on Hacking)
Image
 Process within Information Technology (IT) Cybersecurity, Bureau Veritas
PROCESS
Security Management Implementation (ISO 27017, ISO 27018, ISO 27031, ISO 27001 ISMS)
IT Service Management Systems - ISO 20000-1 ITSMS, TickIT
TISAX®, eIDAS Certification
Security Maturity Review
IT Risk Assessment (Site)
Vendor Security 
Privacy / Data protection / ISO 27701 PIMS / BVC TS for GDPR
ISAE 3000 / 3402 Assurance
Forensics Readiness
Image
 Technology within Information Technology (IT) Cybersecurity, Bureau Veritas
TECHNOLOGY
Threat Modeling / Design Review / Code Review
Vulnerability Assessment & Penetration Testing
Cloud Security
Red Teaming
Secure Software Development Lifecycle (S-SDLC)
SIEM/SOC Testing