As an independent ICT security consulting partner, we offer innovative services and solutions for the effective exchange of information in a secure working environment.
Our way of working is based on a three-phase model that approaches security from a holistic, methodological yet practical perspective.
We are first and foremost result-driven.
We assess your organisation’s evident and latent needs in ICT security. We detect vulnerabilities and reduce them to controllable risks. We give recommendations to obtain the most effective interaction between people, information and environment.
We give you guidance to cover your ICT security needs. We determine the optimal strategies, together with the most convenient technologies and solutions. That way you can move to implementation in a well-informed and structured way.
We assist your organisation with the implementation of your ICT security policy. We supervise the integration of all risk management technologies involved. As an independent third party, we bring strong added value to the integration process.
There are several large and small companies that offer ICT Security Services. Why should you decide to work with us?
We are independent from product vendors and integrators. You can trust that the advice we bring is unbiased.
Experts in every domain
We have a team of experts that each have their own field of expertise. That way we can always put the right person in the right place.
We are at our best when we can combine our fields of knowledge to create a solution tailored to your needs.
Methodological yet pragmatic
We have a very methodological approach and use well acknowledged security frameworks and standards, but in a very pragmatic way.
We value the knowledge our people bring to the team and help them deepen and widen it. We share knowledge within Toreon and with clients.
Long term thinking
We are always looking for long term relationships of trust with our clients to achieve a higher security maturity that brings value to their business.
In my previous blog, I discussed the need for adequate awareness and how this is the task of the DPO. The accountability principle requires you to be able to objectively demonstrate compliance.
So here are some tips to do just that:
https://www.toreon.com/wp-content/uploads/2017/12/GDPR-awareness-2.jpg532800Siebe De Roovere/wp-content/uploads/2016/07/logo.pngSiebe De Roovere2017-12-11 10:03:412017-12-11 10:03:41GDPR: tips for demonstrating compliance to the awareness requirement
At the last Privacy Café*, held in Mechelen on October 23rd, Seba Deleersnyder, co-founder and managing partner of Toreon, and Siebe De Roovere, Privacy and Information Secruity Expert at Toreon, explained to the Café’s guests how to combine…
https://www.toreon.com/wp-content/uploads/2017/12/Siebe-at-Privacy-Café.jpeg344510Sebastien Deleersnyder/wp-content/uploads/2016/07/logo.pngSebastien Deleersnyder2017-12-10 13:55:072017-12-10 13:55:07Toreon at Privacy Café: combining privacy by design with the SDLC
The GDPR requires that both controllers and processors implement adequate security measures in order to protect the processed personal data. The word ‘adequate’ seems vague and open to interpretation to most.
For security experts however,…
https://www.toreon.com/wp-content/uploads/2017/12/GDPR-awareness-1.jpg529800Siebe De Roovere/wp-content/uploads/2016/07/logo.pngSiebe De Roovere2017-12-08 12:34:132017-12-08 12:34:13GDPR: adequate security measures and awareness
KMO Portefeuille Are you an SME in Flanders? Great news! Toreon is recognised as KMO-portefeuille service provider for trainings, analyses and advise. Which means your investment in security can be subsidised.
In order to inform you of our policies and activities with respect to the collection, use and transfer of Personal Data on our websites, you can find an electronic copy of our Privacy Notice here.
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.