Know your IT threats and reduce risks: with our Security Risk Treatment services
Information, IT systems and application processes are subject to complex threats. Knowing these and using them to determine the specific risks for the individual situation is essential. We support you with our Security Risk Treatment services.
A comprehensive and customized threat analysis is the key to deriving concrete IT, operational and business risks and identifying the necessary measures. With its methodical Security Risk Treatment services, RUAG ICT Consulting will help you to establish adequate protection for your information and its processing.
We offer the following services to support you in the area of Security Risk Treatment:
- Collection of the involved components on systemic, process-related, organizational level (1)
- Determination of the threat scenarios along the attack chain (2)
- Threat assessment against requirements, processes and information (3)
- Carrying out business and system impact analyses
- Drafting and design of risk situation pictures and landscapes
- Evaluation of necessary measures for risk reduction
- Creation of a risk and residual risk report, including visualization
Additions
- e.g. system documentation, use cases and processes
- e.g. attack vectors, attack surfaces, criticality and plausibility
- e.g. security specifications, business processes, operational processes, information security and data protection
Contact
RUAG AG
Stauffacherstrasse 65
3000 Bern 22
Suitable topics for further reading
Security Studies
We help you to eliminate knowledge deficits and clarify open questions. The results of our extensive security studies support you in the decision-making process as well as in the evaluation of new technologies.
Security Engineering
We accompany you throughout the evaluation, development and introduction process for secure IT systems, thereby creating the basis for comprehensive information security.
Security Proofing
Our comprehensive security proofing service supports you in determining your current security status. Furthermore, we work with you to define the necessary measures to achieve your desired IT security level.