The control and mapping of each company's information systems is an indispensable and valuable tool for portraying the areas of those who need immediate intervention, in order to be complied with the Regulation and at the same time minimize the risk exposure.
- IT Audit - Record policies and procedures
- Architecture of the IT infrastructure (internal network, connections, cloud services) and deployment of systems and applications
- Record the security level of IT systems and existing policies and processes followed, as well as the suspected risks
Deliverables:
- Gap Analysis - in relation to the various processing of personal data
- Deployment of systems and applications