<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<channel>
<title>Lupker CMS nieuws</title>
<link>https://www.evidantly.com/</link>
<description>miniCFCMS</description>
<language>en-EN</language>
<webMaster>info@cfconsultancy.nl (miniCFCMS)</webMaster>
<atom:link href="https://www.evidantly.com/rss.php" rel="self" type="application/rss+xml" />
<item>
<title>CYBERRISK 360</title>
<link>https://www.evidantly.com/cyberrisk-360.html</link>
<description><![CDATA[  It is important to know what your most important cyberrisks are.    We determine the scope and ask for evidence in accordance with the customer and we analyze and prioritize your cyberrisks.      We deliver a objective report understandable at all levels   Business impact is limited, we interview stakeholders and do our our assesment   The report provides detailed intelligence what your cyberrisks are. We also make a qualitative analysis and classification so you can easily set priorities in resolving the vulnerabilities.   Depending on the scope and complexity we start with a survey ]]></description>
<category>services</category>
<guid>https://www.evidantly.com/cyberrisk-360.html</guid>
<dc:creator>Lupker CMS</dc:creator>
<pubDate>Sat, 10 Jun 2017 08:43:59 +0000</pubDate>
</item>
<item>
<title>INTERIM MANAGEMENT</title>
<link>https://www.evidantly.com/interim-management.html</link>
<description><![CDATA[]]></description>
<category>services</category>
<guid>https://www.evidantly.com/interim-management.html</guid>
<dc:creator>Lupker CMS</dc:creator>
<pubDate>Mon, 16 May 2016 16:41:20 +0000</pubDate>
</item>
<item>
<title>PREDICTIVE CYBERAWARENESS</title>
<link>https://www.evidantly.com/predictive-cyberawareness.html</link>
<description><![CDATA[ Under development ]]></description>
<category>products</category>
<guid>https://www.evidantly.com/predictive-cyberawareness.html</guid>
<dc:creator>Lupker CMS</dc:creator>
<pubDate>Mon, 16 May 2016 16:39:19 +0000</pubDate>
</item>
<item>
<title>RET CASE</title>
<link>https://www.evidantly.com/ret.html</link>
<description><![CDATA[  The Ministry of Defence plays a vital role in our national security and beyond. We achieve this through the sharing of intelligenceand a intelligent build up and deployment of militairy and cybercapabilities. The DOD employs over 50.000 people in the Netherlands .   Due of the sensitive nature of the assigment we can only disclose that we worked on a cyberresilient program, we delivered cyberarchitects and advisors   Cybercommand      Classified   Classified                           ]]></description>
<category>products</category>
<guid>https://www.evidantly.com/ret.html</guid>
<dc:creator>Lupker CMS</dc:creator>
<pubDate>Fri, 21 Aug 2015 08:35:32 +0000</pubDate>
</item>
<item>
<title>CYBERRISKMANAGEMENT</title>
<link>https://www.evidantly.com/cyberriskmanagement.html</link>
<description><![CDATA[ CYBERRISKMANAGEMENT   We have developed a riskbased approach that can give you realtime and fact based inisight in your cybersecurity, within the hour. It's one of our SAAS cyberrisk solutions. With this riskdashboard you can predict and manage cyberthreats before they happen. Our risk solutiob offers analytical capabilities and you can tracj through a visual time line how threats are evolving. We offer a way of working that provides you control and metrics.      ]]></description>
<category>services</category>
<guid>https://www.evidantly.com/cyberriskmanagement.html</guid>
<dc:creator>Lupker CMS</dc:creator>
<pubDate>Wed, 19 Aug 2015 11:13:14 +0000</pubDate>
</item>
<item>
<title>Evidantly Academy</title>
<link>https://www.evidantly.com/evidantly-academy.html</link>
<description><![CDATA[  Evidantly offers awareness, development and simulation programs for customers and covers the full range of cybersecurity, business and IT risks, compliancy and governance.   We believe that awareness is the first step of understanding the cyberrisks that are involved. Organizations faces many threats coming from all directions and from many sources, therefore its important to address and know the risks and develop a ‘gameplan’.   Organizations can no longer ignore the dangers coming from hackers that are political motivated or state sponsered, but also coming from the internal organization.   Awareness programs are designed to change mindsets and make people act more effectively once they know the risks and their responsibilty to act. Its in a way a business enabler that manages risk more effective.    The disruption that internet has caused and our dependance on it makes it a tough challenge to keep up, because the changes and threats are coming rapidly.   Enhancing security awareness is more than a paper policy and off training its changing mindsets and changing behaviour is a daunting task.   EVIDANTLY programs are designed by highly skilled professionals with a solid background in businessconsultancy, information security and psychology.    ]]></description>
<category>services</category>
<guid>https://www.evidantly.com/evidantly-academy.html</guid>
<dc:creator>Lupker CMS</dc:creator>
<pubDate>Mon, 17 Aug 2015 14:11:04 +0000</pubDate>
</item>
<item>
<title>Incident Response Team</title>
<link>https://www.evidantly.com/incident-response-team.html</link>
<description><![CDATA[  Digitalcrime can be disruptive and ultimately challenging for your security and IT department. We at Evidantly are specialized in IR and for us its business as usual. Ultimately its comes down to organizations that have been hacked and organizations that will be hacked. Many organizations are unprepared and when a serious breach happens and they often watch powerless and try to understand what happened. Organizations in certain branches often think they would not easily become a target. We have the knowledge of the process, technology and skiled people to review and simulate your IR readiness. One of our specialties is designing response strategies.   We are experienced in managing and resolving crisis and stand vast to assist you and your management. We can work in accordance with your managementteam and systematically resolve whatever the problem.   When you suspect a digital crime, it is important that you follow a certain protocol, that you have in advance because time is of the essence    Prioritize   Power on! Leave all your IT assets energized   When possible reproduce, reinstall and don’t turn off your servers   When in doubt please stay calm, observe, orient and then decide to act    You can contact us and we will respond accordingly and assess whats in your best interest. The response team will react within a certain timeframe at your location or remotely. This service is offered by subscription, but of course if you don’t have a subscription we will respond.   We first have to reach an understanding of the business priorities, Do you want to become operational as soon as possible, or is the collection of the first important evidence . Would you like the professionals of Evidantly IRT to take the lead, or should they work with your own capable crisis? Your priority and demands determines our approach and the means we use to solve your crisis. We work based on facts and keyfindings and we will coordinate our approach with your organization and law enforcement agencies.   Communication and transparency is important and we will inform you every step we take and of the progress resolving the incident.   Our Cybersecurity devision can deliver next to the depolyment of IRT complementary cyberservices to support and enhance your management, For example digital forensics, rushed pent-testing of critical systems and increased safety surveillance during the incident.     Datarecovery after incidents such as DDoS or coordinated attacks on your servers.   Security surveillance in emergency situations, when a series of incidents or increased risk.   Threat analysis   Intelligence gathering, through small sensors on your network and key assets   In this way, our security team protects your business against renewed attacks, or set a trap for a repeat offender.   Digital forensics and storage of digital evidence.   ]]></description>
<category>services</category>
<guid>https://www.evidantly.com/incident-response-team.html</guid>
<dc:creator>Lupker CMS</dc:creator>
<pubDate>Fri, 14 Aug 2015 13:26:52 +0000</pubDate>
</item>
</channel>
</rss>