When a security breach or cyber-attack occurs within your business; after the end of this incident, the incident response processes are carried out by individuals or cyber-attacks used in your business.

It is similar to a penetration test, but more comprehensive than a penetration test. The
Find out moreWithin the scope of the Law No. 6698 on the Protection of Personal Data published
Find out moreOur goal is to update your rules or write new rules to strengthen the defense
Find out more