You're using Internet explorer as browser: to enjoy the most complete expierence on our website, we recommend using a newer browser, such as Firefox, Chrome or Safari.
We analyse risks and take care of the Business Impact Analysis (BIA); we define policies and procedures important to organisations.
Information security is a discipline that spans across all business processes. Only a "system" approach can ensure its adequacy and effectiveness.
Governance means establishing processes and organisational structure in order to identify objectives, define strategies & roadmaps and ensure the control of the effectiveness and efficiency of the internal control system, according to an organic, structured, unitary model, transversal to the organization, consistent with the business plan and adherent to the regulations.
"Cyber risk" must be related to the dimensions of cyber space, the space that contains the Internet but extends to elements we cannot see and continues to pervade all areas of our society: over 4.5 billion interconnected people, 20 billion IoT objects, volumes of data and transmissions that are beyond the capacity of any imagination.
Risk calculation is all the more complex the more articulated and interconnected a company's information system is. Analysis techniques are constantly evolving with quantitative or qualitative approaches depending on the objective and context of analysis.
TXT has been researching and developing semi-quantitative analysis methodologies for years, which are effective for compliance, due care and to address information security investments with awareness.
Cybersecurity
Cybersecurity is the way we have been calling IT Security ever since digital technology crossed the boundaries of the virtual world and the Internet and extended to real "things" with industrial control systems, building automation and IoT.
Cyber-security means multidisciplinary expertise, full-stack, situational awareness, knowledge and application of countermeasures on the basis of internationally recognized frameworks, in order to implement operational processes of cyber-security consistent with the management system and the business context.
Business continuity depends on a number of environmental, technological and organisational factors. Its management represents a function of assurance, to all intents and purposes, which must be integrated and coordinated with other functions, including, of course, information security.
Business continuity includes but is not limited to IT continuity, which is usually referred to as Disaster Recovery, but requires collaboration and integration with business processes.
TXT, supports the development of appropriate business continuity plans through the identification of objectives, the definition of strategies, communication and awareness and the definition of processes and procedures for testing and verification.