When a security breach or cyber-attack occurs within your business; after the end of this incident, the incident response processes are carried out by individuals or cyber-attacks used in your business.

Within the scope of the Law No. 6698 on the Protection of Personal Data published
Find out moreWhen all actors in the cyber environment (servers, applications, network components, operating systems, etc.) perform
Find out moreWith our consultancy services, we aim to be their strongest partner in this challenging area
Find out more