Approach of Adjectivum Consultancy
Your wishes and expectations are carefully chartered out and agreed with you.
Our standard roadmap comprises three stages:
Stage A: where are we now – inventory;
Stage B: where do we want to get to – mission, vision and required protection level;
Stage C: how do we get from A to B, and what are the priorities we will set on the way.
Our standard roadmap is a good practice, but can be deviated from in consultation with you. After all, information security is always custom-made. One crucial element is good communication.
A meaningful result
In elaborating the assignment and implementing the activities, we will regularly assess your expectations with you. We describe this process as "expectation management". It helps guarantee a result that lives up to your wishes.
A result that goes further
Organisation, technology, risks and controls are constantly changing. Against that background, it is important to permanently focus attention on maintaining a sound level of information security. With this in mind, we offer flexible follow-up to our clients, ranging from consultancy for bespoke maintenance through to subscriptions for the periodic adjustment of results.
Collaboration with partner businesses
Information security is a broad field of operation, which is undergoing rapid development. In addition, regulators are imposing ever-stricter requirements. To remain fully up to date and to ensure access to all the necessary expert skills, we collaborate with a network of specialist partner businesses.