We provide you with an information security management service that will optimise resources, give you an overview of the security situation and ensure compliance with the legislation and standards.

We help your company make the most efficient use of the financial and human resources allocated to information security.

  • Cost reduction. By outsourcing information security management, you will not have to hire a full-time information security manager or specialists.
  • Effective solutions. We select and implement information security solutions that reflect the size and risk tolerance of your business, avoiding unnecessary costs.
  • Time savings. We take care of information security management tasks, allowing your employees to focus on their core activities.
  • Resource optimisation. We make the most of your own and Grant Thornton’s tools and technologies, reducing the need for new investments.
Send us your inquiry

How does it benefit the client?

  • We help you optimise your information security costs.
  • We give you an appropriate and comprehensible overview of your company’s security situation and the steps needed to improve it.
  • We constantly monitor risks and the regulatory environment that may affect your business (e.g. GDPR, NIS2, DORA, etc.).
  • We guarantee a suitable choice of information security solutions and standards (E‑ITS, ISO 27001, etc.) that reflect the size, requirements and risk tolerance of your business.
  • We provide access to experts without the need for you to hire employees or make additional investments in workspaces and equipment necessary to manage information security.
Send us your inquiry

What is included in the service?

  • Maintaining oversight of the legal environment and risks. We provide you with extensive information on the information security regulatory environment and requirements, along with changes thereto. We help you meet the information security requirements arising from legislation or presented by your clients.
  • Creating an information security roadmap. We identify the information security maturity level of your organisation and provide an appropriate and comprehensible  overview of the necessary steps to achieve the agreed goal, regardless of whether it is related to a domestic or international standard or best practices.
  • Risk analysis. We help you to establish a risk management methodology that meets your organisation’s needs and capabilities, carry out risk analysis and decide on which security measures need to be implemented.
  • Building and supporting your information security management system. We chart responsibilities relating to information security, make proposals for the allocation of security roles and ensure supervision of the requirements set out in your information security guidelines.
Image
Image
  • Incident management. We help you build an incident management system and aid you in resolving, documenting and analysing information security incidents, where necessary. 
  • Implementation of information security measures. We identify appropriate methods and technical solutions, prepare a plan and manage the implementation of information security measures in your organisation.
  • Management of risks related to third party service providers. We check all your service providers for compliance with the standards and regulations of information security as well as your requirements. Thereby we reduce risks and improve your organisation’s overall level of information security
  • Security culture. We prepare and manage a security awareness programme and organise security training. We inform you of relevant major security-related events.
  • Maintaining the information security management system. We carry out planned, necessary activities to maintain the information security management system, includinginspections, tests, improvement proposals, training, among others.
Send us your inquiry