Cyber Risk Management Software

Cyber resilience through risk assessment

In the era of increasing targets for cyber attacks (IoTs, e-commerce, work from home, …), cyber risk is a worldwide concern for all industries, all infrastructures and all company sizes, especially with the rise of cyber criminality, impacting diverse areas: financial and operational losses, system paralysis, stolen and lost data, threats on clients and reputation… Today cyber risk has to be looked at as a major corporate risk and a key point in governance.

Enhancing the security of IT systems by providing a global view of the infrastructure, identifying vulnerabilities and improving reaction times and recovery plans following a system intrusion, the CyberQuartz® module helps Information Systems Security Managers in the implementation of ISO27001 and EBIOS recommendations.  

A global vision of the IT infrastructure

Definition of the database items of the company’s network in the Asset Register:

  • Physical equipment and IoTs
  • Installed software
  • Data and procedures
  • Resources and their accesses
  • External systems interfaces, services, providers and subsidiaries
  • Information to back-up and frequencies

Anticipate actions to improve system security

Risk assessment:

  • Anomaly management in the Anomaly Register
  • Audit management
  • Definition of acceptable level of risk for each item
  • Identification and highlight of vulnerabilities through the ISO27001 and EBIOS checklists

Support to the definition of the risk reduction strategy

Prioritization of key points and areas of improvement

Definition of motions to take on a certain risk

Task and resource management in Gantt diagrams

Efficient recovery through Major Risk management

Major Risk Scenario identification

Recovery plan management

Attempted intrusion history and given response analysis

This module is compatible with our Technical Modules (Mass Upload®, Dashboard Builder®, Report Builder®) for ease of use and customized dashboards & reports: number of vulnerabilities per item, evolution of intrusion attempts, most targeted items…