Home
About DTC
Our Company
Our Team
Services
Building CISO Capabilities
Evaluating Cybersecurity Capabilities
Managing Cyber Risks
Industrial Cybersecurity (IIoT, SCADA)
Building DevSecOps for Digital Transformation
Selecting Cybersecurity Providers
Vulnerability Management
Cyber Intelligence Services
Cybersecurity Awareness
Method & Tools
BOT Method
Security Frameworks
Risk Management Framework
Architecture Security Frameworks
Ethical Hacking Tools
Software Analysis Tools
Hardware Monitoring Tools
Network Monitoring Tools
Industries
Banking
Insurance
Manufacturing
Retail
Utilities
Mining
Energy
Other
Contact
Menu
Home
About DTC
Our Company
Our Team
Services
Building CISO Capabilities
Evaluating Cybersecurity Capabilities
Managing Cyber Risks
Industrial Cybersecurity (IIoT, SCADA)
Building DevSecOps for Digital Transformation
Selecting Cybersecurity Providers
Vulnerability Management
Cyber Intelligence Services
Cybersecurity Awareness
Method & Tools
BOT Method
Security Frameworks
Risk Management Framework
Architecture Security Frameworks
Ethical Hacking Tools
Software Analysis Tools
Hardware Monitoring Tools
Network Monitoring Tools
Industries
Banking
Insurance
Manufacturing
Retail
Utilities
Mining
Energy
Other
Contact
Security Frameworks
NIST
Covers the cybersecurity for every asset of the company, including OT/IoT
Risk based approach, to invest the correct amount of money
Counts with maturity levels that can be improved in the time
Aligned with the compliance of the Sarbanes Oxley Law
ISO 27002
Covers all the security controls needed to establish an Information Security Management System (ISMS)
Risk based approach, to invest the correct amount of money
Compliance of the most respected information security best practices