Cyber Risk Management Software

​Cyber resilience through risk assessment

​In the era of increasing targets for cyber attacks (IoTs, e-commerce, work from home, …), cyber risk is a worldwide concern for all industries, all infrastructures and all company sizes, especially with the rise of cyber criminality, impacting diverse areas: financial and operational losses, system paralysis, stolen and lost data, threats on clients and reputation… Today cyber risk has to be looked at as a major corporate risk and a key point in governance.

​Enhancing the security of IT systems by providing a global view of the infrastructure, identifying vulnerabilities and improving reaction times and recovery plans following a system intrusion, the CyberQuartz® module helps Information Systems Security Managers in the implementation of ISO27001 and EBIOS recommendations.  

​​A global vision of the IT infrastructure

Definition of the database items of the company’s network in the Asset Register:

  • Physical equipment and IoTs
  • Installed software
  • Data and procedures
  • Resources and their accesses
  • External systems interfaces, services, providers and subsidiaries
  • Information to back-up and frequencies

​Anticipate actions to improve system security

​Risk assessment:

  • ​Anomaly management in the Anomaly Register
  • Audit management
  • Definition of acceptable level of risk for each item
  • Identification and highlight of vulnerabilities through the ISO27001 and EBIOS checklists

​Support to the definition of the risk reduction strategy

​Prioritization of key points and areas of improvement

​Definition of motions to take on a certain risk

​Task and resource management in Gantt diagrams

​​ ​Efficient recovery through Major Risk management

​Major Risk Scenario identification

​Recovery plan management

​Attempted intrusion history and given response analysis

​ ​​This module is compatible with our Technical Modules (Mass Upload®, Dashboard Builder®, Report Builder®) for ease of use and customized dashboards & reports: number of vulnerabilities per item, evolution of intrusion attempts, most targeted items… ​