We support our clients in the implementation and adoption of controls used to effectively
the risk. Based on the deep knowledge and experience of our team we help companies to
Information Security Management Best Practices and Standards.
The combination of our know-how, our dedication to Information Security practice, our
and our certifications allow us to efficiently put into practice the Information Security
Consulting projects through which we help our clients reach their aims according to their
organisational and business background.
The fact that we do not commercialize technology nor have partnerships or interest in the
commercialization of Technical Controls allows us to be independent and exempt, totally
on the effectiveness of the cost-benefit equation and aligned with our client's levels of
Our Consulting practice focuses on the specific aims of our clients, which are usually
to risk reduction, regulation, compliance, security organisation, the protection of their
and the company's image. We deal with these challenges using the best international
according to Industry Standards.
Adoption of ISO 27001 Standard (ISMS)
Adoption of ISO Standard 27701 (PIMS)
Execution of Internal Audits
Definition and implementation of information security risk management
Information security training and awareness
Development of Information Security Policies, Procedures and Records
Development of Data Protection Policies, Procedures and Records
Data protection impact assessment (IPRDs) and privacy risk management
Definition and operationalization of Information Security Management metrics
ISO 27001 Compliance/Maturity Assessments
NIST Compliance/Maturity Assessments
GDPR Compliance/Maturity Assessments
QNRCS Compliance/Maturity Assessments
Conformity Assessments/Maturity NIS/ Law No. 46/2018 / Decree Law No. 65/2021
Conformity/Maturity Assessments Regulation ANACOM No. 303/2019
3rd Parties Risk Assessment - practical component of information security and compliance management
Devoteam Cyber Trust Assessment 360 Review - practical component of information security management
ISO 27001 management and operation services (27001 Manager)
Information security management and operation services (Keep-it-Managed-24)
Offensive Security projects are customized according to the
needs and aims of our clients. They can be
technical component, processes, people or more
broadly combined context oriented. They can also
be oriented to deal with questions related to
compliance or regulation.
Devoteam Cyber Trust proposes to carry out penetration tests
that include the security of client's applications
installed on mobile devices and on the backend
services that support them. In this sense, Devoteam Cyber Trust
proposes a holistic analysis to the mobile
ISO/IEC 27001 is the best-known standard in the
requirements for establishing, implementing,
continually improving an information security
(ISMS) within the context of the organisation.
ISO 27701 provides specific requirements and guidance for continuously establishing,
implementing, maintaining, and improving a Privacy Information Management System (PIMS)
as an extension of the Information Security Management System (ISMS) defined in ISO 27001.
Preparation of a corporate governance model that
adopt and comply with all recommendations and
as policies, accountability frameworks,
monitoring and control
processes and mechanisms) is a pressing concern.
Through the use of Risk Management software,
often will uncover more systemic issues, and
to not only prioritize events by risk, but also
report on those
risks to foster continuous improvement.
IntegrityGRC works with upper levels of
management to ensure
strategies are in place to deal with compliance
they occur before the reputation and integrity
of the company
and its staff are jeopardized.
In order to support organisations, Devoteam Cyber Trust
360º Security Review, a holistic service to
provide current and
multidisciplinary status on the maturity, risks,
of the organisation in different vectors.
IntegrityGRC is a platform that helps
organisations to manage
their processes, risk and compliance in a
structured way. Our
platform creates a close link between the
its management and its operational practice,
control of the Organisation’s Information
Specially designed to meet all 27001
requirements and effectively
support your information security program. 27001
security effectively and helps obtaining
compliance as the result
of this seamless link. It contemplates features
that allow knowing
both the big picture and the details required by
the ISMS, at
Infosec Rating is a Solution that allows you to
manage your third-party risk.
Through this Solution it is possible to support
a continuous process of
improvement and risk reduction, also providing
Companies usually hire Pen-Testing once a year
to test their Security.
At KEEP-IT-SECURE-24 we test your Security in a
and provide you a cost-effective model in a
Managed Service approach.
Given the dynamics that applications and
infrastructures require these
days, testing your Security once a year is a
poor approach to your
company’s Security. Find out about the other
features that make our
It's a dynamic and continuous Consulting Service designed to meet the requirements of ISO 27001. It's supported by IntegrityGRC Platform to withstand and maintain the desired goal in the Information Security Management context.
The track of Secure Development is composed of
that aim to equip development professionals with
practices, addressing practical cases, common
as well as the best practices to adopt in this
Application development errors are the source of
number of Security vulnerabilities.