Loading...

cybersecurity

track record

Cybersecurity

Cyber governance and supply chain risk: vendors, cloud, data, and AI as attack surfaces

Support for leadership in defining governance criteria for technological dependencies (vendors, cloud, AI/GenAI tools), with a focus on supply chain risk, access management, data segregation, and change management.

Establishment of minimum requirements and control checklists to make the adoption of external components auditable and to reduce operational exposure.

Cybersecurity

Cyber governance and supply chain risk: vendors, cloud, data, and AI as attack surfaces

Support for leadership in defining governance criteria for technological dependencies (vendors, cloud, AI/GenAI tools), with a focus on supply chain risk, access management, data segregation, and change management.

Establishment of minimum requirements and control checklists to make the adoption of external components auditable and to reduce operational exposure.

Cybersecurity

Preparation for incidents and operational continuity in AI‑enabled contexts

Contribution to the design of playbooks and readiness processes (roles, escalation, decision logs, communication), focused on realistic scenarios where digital and AI systems impact critical processes.

The objective is to make the response faster, more coordinated, and ‘defensible’ from a managerial and reputational perspective.

Cybersecurity

Preparation for incidents and operational continuity in AI‑enabled contexts

Contribution to the design of playbooks and readiness processes (roles, escalation, decision logs, communication), focused on realistic scenarios where digital and AI systems impact critical processes.

The objective is to make the response faster, more coordinated, and ‘defensible’ from a managerial and reputational perspective.

Cybersecurity

Use of AI for security: feasibility assessment, guardrails, and metrics

Strategic assessment of AI initiatives applied to security (detection, triage, task automation), with the definition of adoption criteria, boundaries, and metrics.

Design of a ‘risk-tiered’ approach that balances operational benefits and control, avoiding unmanaged automation on sensitive assets.

Cybersecurity

Use of AI for security: feasibility assessment, guardrails, and metrics

Strategic assessment of AI initiatives applied to security (detection, triage, task automation), with the definition of adoption criteria, boundaries, and metrics.

Design of a ‘risk-tiered’ approach that balances operational benefits and control, avoiding unmanaged automation on sensitive assets.

Cybersecurity

Consultancy services focused on NIS2 governance and cyber risk management for “essential” entities and organisations of primary national importance

Strategic consultancy, support, and advisory services for nationally significant stakeholders falling within the scope of “essential entities” as defined by the NIS2 Directive, with particular emphasis on the role of the Board of Directors and on the adoption of best practices to ensure full regulatory compliance.

Cybersecurity

Consultancy services focused on NIS2 governance and cyber risk management for “essential” entities and organisations of primary national importance

Strategic consultancy, support, and advisory services for nationally significant stakeholders falling within the scope of “essential entities” as defined by the NIS2 Directive, with particular emphasis on the role of the Board of Directors and on the adoption of best practices to ensure full regulatory compliance.

Cybersecurity

Consultancy services in the areas of cybersecurity policy, digital diplomacy, and cyber maturity for European and national institutions

Support and contribution to cybersecurity and digital diplomacy policies for European and national institutions, through consultancy and analytical activities, as well as participation in working groups on cyberspace governance, critical infrastructure protection, and the assessment of cyber maturity across public administrations and SMEs. The activities undertaken combined consultancy with direct contributions to the development of European policies and best practices, through research, participation in working groups, and capacity-building initiatives in cybersecurity and digital diplomacy

Cybersecurity

Consultancy services in the areas of cybersecurity policy, digital diplomacy, and cyber maturity for European and national institutions

Support and contribution to cybersecurity and digital diplomacy policies for European and national institutions, through consultancy and analytical activities, as well as participation in working groups on cyberspace governance, critical infrastructure protection, and the assessment of cyber maturity across public administrations and SMEs. The activities undertaken combined consultancy with direct contributions to the development of European policies and best practices, through research, participation in working groups, and capacity-building initiatives in cybersecurity and digital diplomacy

Cybersecurity

Internationally oriented consultancy, with a focus on the Middle East and Gulf Cooperation Council (GCC) countries

Active participation in numerous international working groups on emerging technologies and cybersecurity within international organizations and think tanks, complemented by consultancy and institutional and academic training activities for public officials, businesses, and academic communities. Particular focus on the Middle East, the Gulf Cooperation Council countries, and notably the United Arab Emirates.

Cybersecurity

Internationally oriented consultancy, with a focus on the Middle East and Gulf Cooperation Council (GCC) countries

Active participation in numerous international working groups on emerging technologies and cybersecurity within international organizations and think tanks, complemented by consultancy and institutional and academic training activities for public officials, businesses, and academic communities. Particular focus on the Middle East, the Gulf Cooperation Council countries, and notably the United Arab Emirates.