Services

We help you meet data protection requirements with the following services:

  • Privacy audits and data mapping to ensure GDPR compliance
  • Development and management of a comprehensive data protection program
  • DPO services, including managing personal data breaches and responding to data subject requests
  • Conducting data protection impact assessments and evaluations
  • Ongoing support within your data protection program, including drafting internal procedures, policies, contract templates, reviewing contracts, and creating necessary documents
  • Dispute resolution, court representation, and assistance with supervisory authorities and administrative procedures.

Our data protection services related to the AI Act focus on ensuring AI systems comply with data protection requirements.

We offer personalized data protection training for you and your team, available in both Estonian and English, tailored to your specific needs:

  • In-person training and workshops at a location of your choice
  • Online training via video, MS Teams, or other platforms
  • Custom-designed content that integrates seamlessly with your existing e-learning system.
  • Information Technology Law

Security Risk Management & Governance

  • Information Security Risk Assessments
  • Risk Treatment Planning
  • Security Governance Consulting
  • Compliance Gap Analysis ( PCI-DSS, ISO 27001, NIS2)
  • ISO 27001 ISMS Implementation (From Planning to Certification)
  • PCI DSS Compliance Implementation & Technical Hardening
  • NIS2 Compliance Strategy & Security Controls Implementation
  • Policy & Procedure Development Aligned with Compliance Needs

Cybersecurity Awareness & Training

  • Security Awareness Programs & Campaigns
  • Phishing Simulations
  • Classroom/Online Trainings
  • Executive & Board-Level Security Training

Security Architecture & Technical Advisory

  • Secure Network & System Architecture Reviews
  • Technical Hardening Guidelines (Servers, Endpoints, Networks)

Security Project Management (Infrastructure, Tooling & SOC)

  • Security Infrastructure Implementation & Delivery
  • SIEM, EDR, DLP, IAM, and Security Tooling Deployment
  • Security Operations Center (SOC) Design & Implementation

Identity & Access Management (IAM)

  • Access Review & Recertification Programs
  • IAM Maturity Assessment
  • Role-Based Access Control (RBAC) Design
  • Privileged Access Management (PAM) Advisory

Vulnerability Management

  • Vulnerability Assessments & Prioritization
  • Vulnerability Management Tooling Setup & Integration
  • Vulnerability Management Program Implementation
  • Patch Management Process Review
  • Remediation Advisory
  • Risk-Based Vulnerability Management Consulting

Penetration Testing & Red Teaming

  • External & Internal Penetration Testing
  • Web & Mobile Application Security Testing
  • Social Engineering Engagements

Incident Response & Threat Detection

  • Incident Response Plan Development
  • Threat Hunting & Detection Strategy
  • Digital Forensics & Post-Breach Analysis
Scroll to Top