Be more efficient in your projects of governance, risk management and compliance with cybersecurity standards and regulatory requirements (DNSSI, Law 09-08, GDPR) thanks to:
Adopt an efficient management system owing to our consultants skills in various areas:
A team of consultants with over 100 Cybersecurity governance missions to their record (Compliance with DNSSI and Act 05-20, Risk analysis, Data classification, Security Policy, Formalization of security processes and procedures, Raising awareness, Cybersecurity Master Plan)
20+ implementation projects of Information Security Management System (ISMS) under ISO 27001
10+ implementations of Business Continuity Management System (BCMS) under ISO22301
For a better post-crisis management and sustainability of your crucial and essential business, we help you set up a continuity process through:
With good practices, a cyberthreat management framework is implemented to mitigate risk exposure of your human, financial and technological resources.
Qualified and DPO (Data Privacy Officer) certified resources to carry out compliance projects in accordance with the European legislation (Data Protection General Regulation, RGDP)
50+ projects of compliance with Act 09-08 in personal data protection
As the first accredited qualified assessor for multiple PCI SSC standards in Africa, our qualified security assessors are trained and certified to support your organizations compliance and certification.
Compliance with the Customer Security Program SWIFT is adapted from the scoping step to the submission of the KYC self-attestation.
Decrease your cyber-fraud risks and meet data protection challenges:
Highly skilled resources working on compliance E-money Cybersecurity projects (6 PCI QSA, 2 PA QSA, 2 PCI 3DS, 1 PCI QPA, 1 PCI CP)
Over 200 support missions for compliance with PCI standards
Extensive geographical coverage (Africa, Europe, Middle East and Asia-Pacific)
DATAPROTECT is a cybersecurity company. As a real international key player, DATAPROTECT is strategically positioned in the cybersecurity ecosystem, thanks to its pool of skills and unique expertise.
Copyright 2022