As an independent ICT security consulting partner, we offer innovative services and solutions for the effective exchange of information in a secure working environment.
Our way of working is based on a three-phase model that approaches security from a holistic, methodological yet practical perspective.
We are first and foremost result-driven.
We assess your organisation’s evident and latent needs in ICT security. We detect vulnerabilities and reduce them to controllable risks. We give recommendations to obtain the most effective interaction between people, information and environment.
We give you guidance to cover your ICT security needs. We determine the optimal strategies, together with the most convenient technologies and solutions. That way you can move to implementation in a well-informed and structured way.
We assist your organisation with the implementation of your ICT security policy. We supervise the integration of all risk management technologies involved. As an independent third party, we bring strong added value to the integration process.
There are several large and small companies that offer ICT Security Services. Why should you decide to work with us?
We are independent from product vendors and integrators. You can trust that the advice we bring is unbiased.
Experts in every domain
We have a team of experts that each have their own field of expertise. That way we can always put the right person in the right place.
We are at our best when we can combine our fields of knowledge to create a solution tailored to your needs.
Methodological yet pragmatic
We have a very methodological approach and use well acknowledged security frameworks and standards, but in a very pragmatic way.
We value the knowledge our people bring to the team and help them deepen and widen it. We share knowledge within Toreon and with clients.
Long term thinking
We are always looking for long term relationships of trust with our clients to achieve a higher security maturity that brings value to their business.
In a previous blog posts (Business and IT aligned with Cybersecurity and Baselining Cybersecurity), I introduced our 'Embrace Cybersecurity' (EC) model for gathering security requirements that can be used to create an information security policy.
/wp-content/uploads/2016/07/logo.png00Thomas Baeck/wp-content/uploads/2016/07/logo.pngThomas Baeck2017-12-19 15:32:042018-01-15 11:03:19Using 'Embrace Cybersecurity' to check on security progress
A new baseline
A typical organisation already has a number of security controls in place to safeguard their business-critical information.
However, organisations can sometimes experience these controls impeding business by being too strict.…
In previous blogs you could already read about what threat modeling is, and about the 4 steps. In practice, however, threat modeling is more than just a technical analysis of your application. The threat landscape is constantly evolving, and…
https://www.toreon.com/wp-content/uploads/2017/01/TM_Doomsday.jpg6661000Sebastien Deleersnyder/wp-content/uploads/2016/07/logo.pngSebastien Deleersnyder2017-12-19 15:29:242017-12-19 15:29:24Gain more insight and create doomsday scenarios for better threat modeling
KMO Portefeuille Are you an SME in Flanders? Great news! Toreon is recognised as KMO-portefeuille service provider for trainings, analyses and advise. Which means your investment in security can be subsidised.
In order to inform you of our policies and activities with respect to the collection, use and transfer of Personal Data on our websites, you can find an electronic copy of our Privacy Notice here.
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.