CINXE.COM
Cyber Risk and Privacy Assessment Services | Cyber Risk GmbH
<!DOCTYPE html> <html lang="en"> <head> <!-- Global site tag (gtag.js) - Google Analytics --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-EY64M9QQ17"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-EY64M9QQ17'); </script> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1"> <!-- The above 3 meta tags *must* come first in the head; any other head content must come *after* these tags --> <title>Cyber Risk and Privacy Assessment Services | Cyber Risk GmbH</title> <meta name="description" content="Cyber Risk GmbH provides expert Corporate Open-Source Intelligence (OSINT) Assessments, along with comprehensive Cyber and Privacy Risk Assessments tailored to identify and mitigate potential vulnerabilities for organizations."> <meta name="keywords" content="Corporate Open Source Intelligence OSINT Assessment, cyber risk assessment, privacy risk assessment, cybersecurity needs assessment, vulnerability assessment, Cyber Risk GmbH, privacy compliance, OSINT for organizations"> <link rel="apple-touch-icon" sizes="180x180" href="apple-touch-icon.png"> <link rel="icon" type="image/png" sizes="32x32" href="favicon-32x32.png"> <link rel="icon" type="image/png" sizes="16x16" href="favicon-16x16.png"> <link rel="shortcut icon" type="image/x-icon" href="favicon.ico"> <link rel="manifest" href="manifest.json"> <meta name="msapplication-TileImage" content="mstile-150x150.png"> <meta name="theme-color" content="#ffffff"> <!-- Bootstrap --> <link href="css/bootstrap.min.css" rel="stylesheet"> <link href="css/style.css" rel="stylesheet"> <!--font-awesome--> <link href="https://stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css" rel="stylesheet"> <link href="https://fonts.googleapis.com/css2?family=Montserrat:wght@100;200;300;400;500;600;700;800;900&display=swap" rel="stylesheet"> <!-- Owl Stylesheets --> <link rel="stylesheet" href="css/owl.carousel.css"> <link rel="stylesheet" href="css/owl.theme.default.css"> <!-- javascript --> <script src="js/jquery.min.js"></script> <script src="js/owl.carousel.js"></script> <style> img { display: block; margin-left: auto; margin-right: auto; } </style> <style> .wrapper-banner { background: url("36002.jpg"); background-size: cover; background-position: center; } </style> <style> body { color: black; } </style> <style> a:link { color: blue; background-color: transparent; text-decoration: none; } a:visited { color: blue; background-color: transparent; text-decoration: none; } a:hover { color: red; background-color: transparent; text-decoration: underline; } a:active { color: blue; background-color: transparent; text-decoration: underline; } </style> </head> <body> <!-- Fixed navbar --> <div class="wrapper-menu"> <nav id="header" class="navbar navbar-fixed-top"> <div id="header-container" class="container navbar-container"> <div class="navbar-header"> <button type="button" class="navbar-toggle collapsed" data-toggle="collapse" data-target="#navbar" aria-expanded="false" aria-controls="navbar"> <span class="sr-only">Toggle navigation</span> <span class="icon-bar"></span> <span class="icon-bar"></span> <span class="icon-bar"></span> </button> <a id="brand" class="navbar-brand" href="https://www.cyber-risk-gmbh.com/"> <img src="images/logo/CyberRisk5FINALFINAL.png" alt="Cyber Risk GmbH, Cyber Risk Awareness and Training" width="240" class="img-responsive"> <!--<img src="images/logo-black.png" alt="" class="shrink-logo"> --> </a> </div> <div id="navbar" class="collapse navbar-collapse"> <ul class="nav navbar-nav"> <li><a href="https://www.cyber-risk-gmbh.com/About.html" target="_blank">About</a></li> <li><a href="https://www.cyber-risk-gmbh.com/Training.html" target="_blank">Training</a></li> <li><a href="https://www.cyber-risk-gmbh.com/Board.html" target="_blank">For The Board</a></li> <li><a href="https://www.cyber-risk-gmbh.com/Assessment.html" target="_blank">Assessment</a></li> <li><a href="https://www.cyber-risk-gmbh.com/Reading_Room.html" target="_blank">Reading Room</a></li> <li><a href="https://www.cyber-risk-gmbh.com/Contact.html" target="_blank">Contact</a></li> <li><a href="https://www.cyber-risk-gmbh.com/Cyber_Risk_Links.html" target="_blank">Cyber Risk Links</a></li> <li><a href="https://www.cyber-risk-gmbh.com/Impressum.html" target="_blank">Impressum</a></li> </ul> </div> <!-- /.nav-collapse --> </div> <!-- /.container --> </nav> <!-- /.navbar --> </div> <div class="container-fluid wrapper-banner"> <div class="container"> <div class="top-banner"> </div> </div> </div> <div class="container-fluid projects-wrapper"> <div class="container"> <div class="row"> <div class="section-title"> <h1>Cyber Risk and Privacy Assessment</h1> <br> <br> <p class="text-left"> <b>Corporate Open Source Intelligence (OSINT) Assessment:</b> The objective of the open source intelligence (OSINT) assessment is to identify possible risks and vulnerabilities that are public, available, and leave the organization exposed to risks that can be exploited by threat actors.</p> <p class="text-left">OSINT is often used as an offensive discipline for cyber-attacks. The quality of the open source intelligence that is collected on the target organization and its employees is often the determining factor on whether a cyber-attack will be successful. Attackers leverage the information they collect from public resources to identify attack verticals, especially on the human layer (for social engineering attacks) and the security of the physical perimeter. </p> <p class="text-left">We conduct OSINT as a defensive discipline to help organizations to proactively deal with this problem and reduce or eliminate potential attack vectors. Following the path a threat actor would take, we conduct an OSINT analysis on publicly available resources on the client organization and entities closely associated to them, including business partners and service providers. By identifying the information and opportunities an attacker may exploit, organizations have the chance to proactively prepare on mitigating risks and educating their employees. </p> <p class="text-left">We understand that information exposure is often unavoidable or serves significant organizational interests. Unavoidably, this exposure comes with certain risks. Our findings are always followed with recommendations and advice to help organizations minimize or eliminate risks, and act proactively against certain threats.</p> <p class="text-left"><b>Cyber and Privacy Needs Assessment:</b> A needs assessment is a systematic exploration of the way things are, and the way they should be. The key is to seek the gap between the current situation and the desired situation. We investigate which are the cyber risk and privacy requirements for your organization. Do you need to comply with the Swiss, the EU, or the US requirements, or all these requirements together? What about the standards at the level of the group? We compare your existing standards with the required standards. We develop a confidential report explaining what we have found. We give a presentation to the Board of Directors, the CEO and the CRO and we answer all questions. </p> <p class="text-left"><b>Cyber and Privacy Risk Assessment:</b> We learn which are your cyber risk and privacy standards, policies, procedures, and code of ethics. We examine which is the actual performance of employees, suppliers, service providers and all stakeholders. Do they meet the Board鈥檚 expectations? We develop a confidential report explaining what we have found. We give a presentation to the Board of Directors, the CEO and the CRO and we answer all questions. </p> <br> <br> <br> <h3>Cyber Security Training</h3> <p>Cyber security is ofter boring for employees. We can make it exciting.</p> </div> <br> <div class="projects-row"> <div class="col-sm-3 col-md-4"> <div class="projects-info"> <div class="projects-image"><img src="images/1a.png" alt="Online Cybersecurity Training" width="350" class="img-responsive"></div> <h3 class="text-left col-md-11">Online Training </h3> <p class="col-md-10 text-left">Recorded on-demand training and live webinars.</p> <div class="read-more col-md-10"><a href="https://www.cyber-risk-gmbh.com/Online_Training.html" target="_blank">More <i class="fa fa-angle-double-right"></i></a></div> </div> </div> <div class="col-sm-3 col-md-4"> <div class="projects-info"> <div class="projects-image"><img src="images/2a.png" alt="In-house Cybersecurity Training" width="350" class="img-responsive"></div> <h3 class="text-left col-md-11">In-house Training </h3> <p class="col-md-10 text-left">Engaging training classes and workshops. </p> <div class="read-more col-md-10"><a href="https://www.cyber-risk-gmbh.com/In_House_Training.html" target="_blank">More <i class="fa fa-angle-double-right"></i></a></div> </div> </div> <div class="col-sm-3 col-md-4"> <div class="projects-info"> <div class="projects-image"><img src="images/3a.png" alt="Social Engineering Cybersecurity Training" width="350" class="img-responsive"></div> <h3 class="text-left col-md-11">Social Engineering</h3> <p class="col-md-10 text-left">Developing the human perimeter to deal with cyber threats. </p> <div class="read-more col-md-10"><a href="https://www.cyber-risk-gmbh.com/Social_Engineering.html" target="_blank">More <i class="fa fa-angle-double-right"></i></a></div> </div> </div> <div class="col-sm-3 col-md-4"> <hr> <div class="projects-info"> <div class="projects-image"><img src="images/4a.png" alt="For the Board Cybersecurity Training" width="350" class="img-responsive"></div> <h3 class="text-left col-md-11">For the Board</h3> <p class="col-md-10 text-left">Short and comprehensive briefings for the board of directors. </p> <div class="read-more col-md-10"><a href="https://www.cyber-risk-gmbh.com/Board.html" target="_blank">More <i class="fa fa-angle-double-right"></i></a></div> </div> </div> <div class="col-sm-3 col-md-4"> <hr> <div class="projects-info"> <div class="projects-image"><img src="images/5a.png" alt="Cybersecurity Assessment" width="350" class="img-responsive"></div> <h3 class="text-left col-md-11">Assessments</h3> <p class="col-md-10 text-left">Open source intelligence (OSINT) reports and recommendations. </p> <div class="read-more col-md-10"><a href="https://www.cyber-risk-gmbh.com/Assessment.html" target="_blank">More <i class="fa fa-angle-double-right"></i></a></div> </div> </div> <div class="col-sm-3 col-md-4"> <hr> <div class="projects-info"> <div class="projects-image"><img src="images/6a.png" alt="High Value Targets Cybersecurity Training" width="350" class="img-responsive"></div> <h3 class="text-left col-md-11">High Value Targets</h3> <p class="col-md-10 text-left">They have the most skilled adversaries. We can help. </p> <div class="read-more col-md-10"><a href="https://www.cyber-risk-gmbh.com/High_Value_Targets.html" target="_blank">More <i class="fa fa-angle-double-right"></i></a></div> </div> </div> </div> </div> </div> </div> <br> <br> <br> <br> <div class="container-fluid projects-wrapper"> <div class="container"> <div class="row"> <div class="section-title"> <h3>Which is the next step?</h3> </div> <div class="countdown-row"> <div class="countdown-block"> <h2>1</h2> <strong>You contact us</strong> </div> <div class="countdown-block"> <h2>2</h2> <strong>We discuss</strong> </div> <div class="countdown-block"> <h2>3</h2> <strong>Our proposal</strong> </div> <div class="countdown-block"> <h2>4</h2> <strong>Changes and approval</strong> </div> <div class="countdown-block"> <h2>5</h2> <strong>We deliver</strong> </div> </div> </div> </div> </div> <br> <br> <br> <br> <br> <br> <br> <img src="https://www.cyber-risk-gmbh.com/Epilogue3.jpg" alt="Cyber Risk GmbH, Cyber Risk Awareness and Training" class="img-responsive"> <!--<script src="https://ajax.googleapis.com/ajax/libs/jquery/1.12.4/jquery.min.js"></script> --> <script src="js/bootstrap.js"></script> <script> $(document).ready(function() { var owl = $('.cliend-logo'); owl.owlCarousel({ margin: 20, nav: true, loop: true, autoplay:true, autoplayTimeout:4000, responsive: { 0: { items: 1 }, 600: { items: 6 }, 1000: { items: 6 } } }) }) $(document).ready(function() { var owl = $('.testimonialstext'); owl.owlCarousel({ margin: 20, nav: true, loop: true, autoplay:true, autoplayTimeout:4000, responsive: { 0: { items: 1 }, 600: { items: 1 }, 1000: { items: 1 } } }) }) </script> <script> $(window).scroll(function() { if ($(document).scrollTop() > 50) { $('nav').addClass('shrink'); $('.add').hide(); } else { $('nav').removeClass('shrink'); $('.add').show(); } }); </script> </body> </html>