
1One of the biggest threats to any organization today is a cyber security attack or a data breach. As a result, many organizations are mitigating the risks by stepping up their security. However, IT security remains a complex matter, where external support is at times needed. As a solution, CRANIUM offers a Security Evolution Scan, where the current security level of a company is assessed and compared to the desired level of security. A result is then created with findings, recommendations and a roadmap, to make the implementation of the recommendation easier.
3After a SES, your organization will have a structured overview of its current and desired security level, have a list of findings and corresponding recommendations and an easily implementable roadmap making the organization more secure.

2A SES is divided into several phases: a kick-off, the actual SES, the delivery of the results and the delivery of the final report. The SES is kicked-off with a presentation tailored to you, that addresses the main security issues in your sector or industry. It will also allow our consultants to get to know your organization.
The second phase contains the interviews and review of documentation. The consultants will assess the current information security framework in your company through interviews with stakeholders in different departments, thus making sure they get a complete and in-depth view of your organisation. The provided documents will be reviewed. The notes taken during the interviews and the review of the documents will be consolidated in a list of observations and a presentation report, which will give you a structured overview of the entire process. The presentation report contains:
- Management summary
- Current security level
- Observations and Recommendations per security section
- Implementation Roadmap
During this presentation, you can ask additional questions or make remarks. These will be processed in the final report accordingly, so the final report will be tailored exactly to your needs.
1One of the biggest threats to any organization today is a cyber security attack or a data breach. As a result, many organizations are mitigating the risks by stepping up their security. However, IT security remains a complex matter, where external support is at times needed. As a solution, CRANIUM offers a Security Evolution Scan, where the current security level of a company is assessed and compared to the desired level of security. A result is then created with findings, recommendations and a roadmap, to make the implementation of the recommendation easier.
2A SES is divided into several phases: a kick-off, the actual SES, the delivery of the results and the delivery of the final report. The SES is kicked-off with a presentation tailored to you, that addresses the main security issues in your sector or industry. It will also allow our consultants to get to know your organization.
The second phase contains the interviews and review of documentation. The consultants will assess the current GDPR compliance level within your company through interview with stakeholders in different departments, thus making sure they get a complete and in-depth view of your organization. The provided documents will be reviewed. The notes taking during the interviews and the review of the documents will be consolidated in a list of observations and a presentation report, which will give you a structured overview of the entire process. The presentation report contains:
- Management summary
- Current security level
- Observations and Recommendations per security section
- Implementation Roadmap
The Roadmap gives an overview of how many man days it will take for your organization to implement the recommendations given by CRANIUM and improve compliance with the GDPR. The Roadmap is also a visual in time to show how many days per month you will need to implement the recommendations given by CRANIUM.
During this presentation, you can ask additional questions or make remarks. These will be processed in the final report accordingly, so the final report will be tailored exactly to your needs.
3After a SES, your organization will have a structured overview of its current and desired security level, have a list of findings and corresponding recommendations and an easily implementable roadmap making the organization more secure.
