Privacy Statement

PROCESSED PERSONAL DATA

Demiroz Consultancy B.V. can process personal data about you, because you make use of the services of Demiroz Consultancy B.V., and/or because you provide it yourself when filling in a contact form on the website. Demiroz Consultancy B.V. can process the following personal data:

  • Your first and last name
  • Your address details
  • Your phone number
  • Your email address
  • Your IP address

THE REASON WHY DEMIROZ CONSULTANCY B.V. NEEDS DATA

Demiroz Consultancy B.V. processes your personal data to be able to contact you by telephone if you request it, and/or to be able to contact you in writing (by e-mail and/or by post). Demiroz Consultancy B.V. uses your personal data in the context of carrying out an agreement of a contract with you, usually consisting of services.

THE TIME DEMIROZ CONSULTANCY B.V. SAVES THE DATA

Demiroz Consultancy B.V. does not store your personal data longer than is strictly necessary to achieve the goals for which your data is collected. Your data will not be stored for longer than a year if no agreement is reached with you.

SHARE WITH OTHERS

Demiroz Consultancy B.V. provides your personal data only to third parties if this is necessary for the execution of an agreement with you, or to comply with a legal obligation.

MAPPING THE WEBSITE VISIT

On the website of Demiroz Consultancy B.V. general visitor data is recorded, including the IP address of your computer and the time of retrieval and data that your browser sends. This data is used for analyses of visitor and click behavior on the website. Demiroz Consultancy B.V. uses this information to improve the functioning of the website. These data are anonymized as much as possible and are not provided to third parties.

GOOGLE ANALYTICS

Demiroz Consultancy B.V. uses Google Analytics to keep track of how users that use the website and how effectively the Adwords ads from Demiroz Consultancy B.V. of the Google search result pages are.

The information thus obtained, including the address of your computer (IP address), is transferred to and stored by Google on servers in the United States. Read Google’s privacy policy for more information. You also find the privacy policy of Google Analytics here.

Google uses this information to keep track of how our website is used, to report on the Website to Demiroz Consultancy B.V. to provide information and to provide advertisers with information about the effectiveness of their campaigns.

Google may provide this information to third parties if Google is legally obliged to do so, or if such third parties process the information on behalf of Google. Demiroz Consultancy B.V. does not affect this.

Demiroz Consultancy B.V. Google has not given permission to use Demiroz Consultancy B.V. obtained Analytics information for other Google services.

SEE, CUSTOMIZE OR REMOVE DATA

You have the right to view, correct or delete your personal data. You can send a request for access, correction or deletion to info@demiroz.nl. Demiroz Consultancy B.V. will respond to your request as soon as possible, but at least within four weeks.

COOKIE POLICY

www.demiroz.nl uses cookies for technical and analytical purposes. Additionally, cookies are used to allow you to share certain content through social media networks.

__unam

This cookie is used for the ShareThis social sharing widget in order to enable sharing of content across various social networks. It counts clicks and shares of a page.

__utma, __utmb, __utmc, __utmz

These are cookies set by the Google Analytics service which enables us to track visitor behavior and measure site performance.

__icl__visitor_lang_js, __icl_current_language

These are cookies that have a technical function. They enable us to deliver the site in different languages.

cookie_notice

This cookie allows us to save your cookie preferences for your next visit.

Industrial Control Security Management

Informatie- en industriële controle systemen (ICS) worden gebruikt om industriële machines te controleren en bewaken. ICS zijn essentieel voor de continuïteit van vitale infrastructuren en daarom is het van belang om deze systemen optimaal te beveiligen. Wij kunnen helpen uw ICS te beschermen tegen onbevoegden, manipulatie van processen en schade aan systemen.

Supply Chain Security Management

Hoogwaardige beveiligingsinbreuken hebben aangetoond dat het beveiligen van uw Supply Chain van essentieel belang is voor de informatiebeveiliging van uw organisatie. Wij beoordelen de beveiliging binnen uw Supply Chain door het in kaart brengen van alle suppliers die bedrijfsgevoelige informatie bezitten, het beoordelen van de contracten en de daarin gemaakte afspraken en het beoordelen van de reeds door de organisatie getroffen maatregelen. Op basis van dit onderzoek geven wij aanbevelingen om de informatiebeveiliging binnen de Supply Chain te verbeteren.

Onafhankelijke Security Advies

Wilt u de informatiebeveiliging liever niet volledig uitbesteden maar wenst u een sparringpartner of tijdelijke ondersteuning op afstand of intern? Denk hierbij aan een strategische verandering, het implementeren van een nieuw process, het verhogen van het bewustzijn van informatiebeveiliging enzovoort. Wij bieden Independent Security Advisors aan, die kunnen optreden als uw informatie beveiligingspartner, direct beveiligingsexpertise verlenen en specialistische vaardigheden bieden. Wij helpen u graag verder op weg in het beveiligen van uw informatie.

Cyber Weerbaarheid

Tegenwoordig is de kans dat er een cyberincident plaatsvindt zeer groot. Hierbij is het cruciaal dat de onderneming juist en tijdig reageert op een cyberaanval met behulp van een vooraf gedefinieerd en getest Cyber Response Plan. Wij kunnen uw organisatie ondersteunen met het opsporen van en verdedigen tegen bedreigingen van aanvallers, georganiseerde misdaad en (kwaadwillende) insiders.

Healthcheck

De Healthcheck is een strategische tool waarin reeds getroffen informatiebeveiligingsmaatregelen worden beoordeeld, verbeterd en aanvullende maatregelen geadviseerd. Dit wordt gedaan door een stapsgewijze analyse waarin diverse onderwerpen aan bod komen en bevindingen worden gedaan. Op basis van deze bevindingen worden er aanbevelingen opgesteld en in een persoonlijk gesprek teruggekoppeld. De onderwerpen van onze Healthcheck zijn:

  • Beleid, bedrijf en verantwoordelijkheden
  • Incident Management
  • Industrial Control Systems
  • Intellectuele eigendommen
  • Middelenbeheer
  • Operationeel Management
  • Supply Chain Management
  • Toegangsbeheer
  • Verandermanagement

Risicomanagement

Risicomanagement is een proces waarbij informatie risico’s worden geïdentificeerd, beoordeeld en beheerst zodat er een totaalbeeld wordt gecreëerd. Met het implementeren van het Risk Management proces is uw organisatie in staat weloverwogen keuzes te maken omtrent toekomstige plannen en investeringen. Wij begeleiden uw informatiebeveiligingsmedewerkers met het implementeren van het vijf-fasen proces bestaande uit:

  • Stap 1: Scope bepalen
  • Stap 2: Risk Assessment
    • Stap 2a: Identificeren van de risico’s
    • Stap 2b: Analyseren en evalueren van de risico’s
  • Stap 3: Business Impact Assessment
  • Stap 4: Risicobeheersing
  • Stap 5: Monitoren en controleren van de risico’s en de getroffen maatregelen

Deze aanpak is geschikt voor grote bedrijven waarbij de inbreuk op bedrijfsgevoelige informatie een grote impact heeft voor zowel de interne als de externe omgeving van het bedrijf.

Risk Management

Risk Management is a process to identify, assess and control information risks to provide an overall picture. By implementing the Risk Management process, the company will be able to make informed choices about future plans and investments. It will help your information risk practitioners to implement the five-phase process consisting:

  • Step 1: Scoping
  • Step 2: Risk Assessment
    • Step 2a: Identify risks
    • Step 2b: Analyse and evaluate the risks
  • Step 3: Business Impact Assessment
  • Step 4: Risk Treatment
  • Step 5: Monitor and control the risks and the taken measures

This approach is suitable for organisation where a cybersecurity breach has a big impact on the internal- and external environment.

Healthcheck

The Healthcheck is a strategic tool to assess and improve security arrangements. Through a step-by-step analysis, we assess the current information security by evaluating the current measures and advice improvements of these measures. Also, we give additional recommendations to improve the organisation’s information security. The subjects of our Healthcheck are:

  • Policy, company and responsibilities
  • Incident Management
  • Industrial Control Systems
  • Intellectual property
  • Asset Management
  • Operational Management
  • Supply Chain Management
  • Acces Management
  • Change Management

Cyber Resilience

Nowadays, the chance of a cyber incident is very high. It is crucial that the company responds correctly and timely to a cyber-attack using a predefined and tested Cyber Response Plan. We support your organization with tracking down the and defend from attackers, organized crime and (malicious) insiders.

Independent Security Advisory

Do you prefer not to outsource the information security completely but do you want a sparring partner or temporary support at a distance or internally? With this you can think about a strategic change, implementing a new process, to improve security awareness etc. We offer Independent Security Advisers. We act as your information security partner, provide instant security expertise, specialty skills, and experience to keep you on track.

Supply Chain Managementshield

High profile security breaches have shown that securing your supply chain is essential to protect your organisation. We provide organizations with an independent assessment of its approach to supply chain risk management. By identifying all suppliers with critical information and/or sensitive data, evaluating the contracts and agreements. Based on this research we provide recommendations to improve information security in the Supply Chain.

Industrial Control Security Management

Information and industrial control systems (ICS) are used to control and monitor industrial machines. ICS are essential for the continuity of vital infrastructures and therefore it is important to ensure optimal security of these systems. We can help protect your ICS against unauthorized persons, process manipulation and system damage.