Skip to main content
Home
  • Introduction
  • Project
    • Organization Priority Scan
    • Risk assessment
    • Implementation
    • Validation
  • Subscription
  • Services
    • Dienstverlening gemeenten
      • ENSIA Audit & Assurance rapport
      • Nulmeting ENSIA
    • Opleidingen en trainingen
      • Opleiding introductie ISO 27001
      • CISM-opleiding
      • CISSP-opleiding
      • Interne Auditor
      • Developer Security training
    • Security & Risk Management
      • OBE Maatregel / VRKI / SRMBoK
      • ABDO 2017
      • Security Awareness
      • AVG Quick scan
      • ISO/IEC 27001 certification
      • ICT beveiligingsassessment (DigiD)
      • ISMS Creation
      • Creating Data Processing Agreement
      • Opstellen intern beleid meldplicht datalekken
      • Code of conduct creation
      • Creation Privacy Policy
      • Creation privacy statement
      • Quick Scan (Zorg)
      • Quick scan privacy gap
      • Security Audit
      • Baseline Informatiebeveiliging Rijksdienst (BIR)
      • Uitvoeren Privacy Impact Assessment (PIA)
      • Uitvoeren SURFaudit
      • Uitvoeren VECOZO-audit
      • Certificering tegen NEN7512
      • Informatiebeveiliging offshore-installaties TF08
      • VIPP-audit
    • Asset Security
      • Shareloch
    • Security Engineering
      • Advies M.B.T. beleid en implementatie
      • Consult fire prevention
      • Consult theft prevention
    • Communications and Network Security
    • Identity and Access management
      • Advies m.b.t. toegangscontrole
      • Inzetten mystery guest
    • Security assessment and testing
      • Black box test
      • Grey box test
      • White box test
      • Gesimuleerde Phishing Test
      • Kwetsbaarheidsscan
    • Security Operations
      • Data mutation research
      • Security Operations Center (SOC)
    • Software development security
      • Code review
      • Threat modeling
    • Zorg eisen
  • News
  • Blog
  • Information security

    You are busy working in your company. Your organization is processing a lot of information both in physical and digital form. You know there are threats to the availability, integrity and confidentiality of your information. But you don't have the knowledge and experience to counter these problems. They should however be taken care of...

    If you recognize yourself in the above, you have come to the right place.

  • The specialist you need...

    Information security is on your mind and it keeps you busy. Sometimes you need an extra specialist for a short or longer time to deliver that puzzle piece you need to complete the puzzle and keep it that way. Conan Doyle provides specialists in the full width of the spectrum of information security. It's a good feeling that you can go to one place for all your information on security issues and solve them in no time.

     

Als onderdeel van onze

Sentinel Services bieden wij

een continue websitescan aan.

Scan direct uw website

ConanDoyle levert

Project approach

You have decided that your organization has to improve in the field of information security. This requires a simple and efficient approach with three...

Security Subscription

ConanDoyle assists organizations by providing information security on a subscription basis... With a subscription we keep your information security up...

Professionals

Your organization is implementing information security, however, sometimes an extra specialist is required...

Professionals

Profile picture for user Mark van Zitteren

Mark van Zitteren RE

View details
Profile picture for user Arno Franken

Arno Franken MSc CISSP CISA

View details
Profile picture for user Natascha van Duuren

Natascha van Duuren

View details
Bekijk al onze professionals
  • Follow us on LinkedIn
  • linkedin

Copyright © 2016 - 2018 ConanDoyle. All rights reserved.

ConanDoyle BV
Naaldwijkseweg 65
2291 PA  Wateringen

085 - 0606496
SirArthur@conandoyle.eu

Subfooter

  • Home
  • Contact
  • Disclaimer
  • Log in professional
  • Voorwaarden