We advise and consult on all data protection, privacy and information security related topics. From specific topics to the full implementation of privacy programs and information security management systems.
Our project experience in combination with our knowledge in technology as well as legal aspects of privacy create unique value for all of our clients.
Consulting on ISO27001 project for HR analytics provider.
Pentesting on patient data platform for large digital healtcare provider. Advice on hardening environments.
Consulting on implementation of privacy operations in the gaming industry to comply with US state laws and EU regulations including parental consent.
Advising airplane manufacturer on privacy related topics and ownership of data in relation to connected aircraft services and global data transfers.
Do you want to understand where to start or get a first feedback on the requirements and elements of privacy? Then the privacy workshop is best suited for you. We will discuss your regulatory environment, your IT setup as well as further requirements you must fulfill.
Would you like to discuss your information security setup and receive feedback on the controls which are implemented? During the InfoSec workshop we discuss your IT Landscape, identify gaps and recommend first measures to improve your InfoSec levels. With this workshop you will be able to plan your next steps to improve your InfoSec stance.
Vulnerability Scanners are automated tools that scan web applications, normally from the outside, to look for security vulnerabilities such as Cross-site scripting, SQL Injection, Command Injection, Path Traversal and insecure server configuration.
These scans form a first line of defense against InfoSec risks. Our experts will carry out the scans and provide you with a report that takes the Overall context into Account and provides you with actionable advice. Our vulnerability scans and consulting packages are offered at a fixed price.
A penetration test, also known as a pen test, is a simulated cyber attack against your IT system to check for exploitable vulnerabilities. In the context our IT security experts manually try to get into your systems, inject code or identify other vulnerabilities. Pen testing can involve the attempted breaching of any number of application systems, (e.g., application protocol interfaces (APIs), frontend/backend servers) to uncover vulnerabilities, such as unsanitized inputs that are susceptible to code injection attacks.
Contact us to discuss your goals and we will provide you with a tailored fixed price offer for penetration testing of your systems.
The Priverion DPO support you using their technological and legal experience in managing privacy programs. From setup to ongoing support.
Inquire nowEnsures you stay up to date with regulatory requirements
One contact point for all requests from customers, employees and suppliers
Reduces risk of fines due to non-compliance
Works with realistic timeframes and budgets for privacy operations
Leverage cross-Industry experience
Reduces time spent on vendor assessments
Any company marketing products and services to European customers is required to appoint a EU Representative. The same applies to product or service offerings in the UK or Switzerland.
Inquire nowEU – Munich, Germany — EU Representative according to GDPR
London, UK — UK Representative according to UK GDPR
Zurich, Switzerland — Swiss Representative according to the FADP
The Priverion InfoSec Officer is the gatekeeper for your IT environment. Advising on technical and organizational measures and giving feedback on proposed IT infrastructure changes.
Inquire nowReduces damages due to incidents
Applies frameworks and standards such as ISO27001
Close gaps using best practices
Conducts regular audits to ensure effectiveness of measures
Leverages technological experience with IT security engineers
Regularly reports to the board or CTO/CIO