• Home
  • About
  • Crowmoor Consultants
  • Jericho Books

crowmoor.se

by Jesper Kråkhede, Sweden

Feed on
Posts
Comments

Crowmoor Consultants

Dec 3rd, 2017 by Jesper Kråkhede

Crowmoor Consultants is a small independent security company specialised in security architecture and risk analysis.

We mainly deliver our services on a fixed price basis.

Risk Analysis:
We conduct a risk analysis with the latest threats towards an IT-environment as a background using NIST and ISO-27000 as a base line for the security. The deliverables are a list of risks, possible mitigations and a high-level plan to mitigate those risks.
We take risk analysis very seriously and suggest that before conducting a risk analysis with us you make sure that you manage your brick-and-mortar security. Please drop us a mail to ask for the pre-risk analysis list.

Security architecture process:
We run training sessions in basic security architecture methodology to enable an organisation to work with security in a more organised manner. Technical security is good, administrative security is good, making it work together is best. Being able to communicate security to the board members is top notch.

GDPR:
We don´t give legal advice on GDPR but we do help you enable security methodology that can support your process of becoming and staying compliant with GDPR.

Please drop a mail to jesper.krakhede@crowmoor.se for further questions and a quote.

Comments are closed.

  • Recent Posts

    • ZeroTrust – 1st principle
    • ZeroTrust – the why
    • ZeroTrust deep dive
    • Security in a car
    • Investigation breeze
    • Investigation limbo
  • Archives

    • May 2019 (1)
    • April 2019 (2)
    • March 2019 (2)
    • February 2019 (2)
    • January 2019 (2)
    • December 2018 (2)
    • November 2018 (2)
    • October 2018 (2)
    • September 2018 (2)
    • August 2018 (2)
    • July 2018 (2)
    • June 2018 (2)
    • May 2018 (2)
    • April 2018 (2)
    • March 2018 (2)
    • February 2018 (2)
    • January 2018 (2)
    • December 2017 (2)
    • November 2017 (2)
    • October 2017 (2)
    • September 2017 (2)
    • August 2017 (3)
    • July 2017 (2)
    • June 2017 (3)
    • May 2017 (3)
    • April 2017 (2)
    • March 2017 (2)
    • February 2017 (2)
    • January 2017 (2)
    • December 2016 (2)
    • November 2016 (2)
    • October 2016 (2)
    • September 2016 (2)
    • August 2016 (2)
    • July 2016 (2)
    • June 2016 (2)
    • May 2016 (2)
    • April 2016 (2)
    • March 2016 (2)
    • February 2016 (2)
    • January 2016 (2)
    • December 2015 (2)
    • November 2015 (2)
    • October 2015 (2)
    • September 2015 (2)
    • August 2015 (2)
    • July 2015 (2)
    • June 2015 (2)
    • May 2015 (2)
    • April 2015 (2)
    • March 2015 (2)
    • February 2015 (2)
    • January 2015 (2)
    • December 2014 (2)
    • November 2014 (2)
    • October 2014 (2)
    • September 2014 (2)
    • August 2014 (2)
    • July 2014 (2)
    • June 2014 (2)
    • May 2014 (2)
    • April 2014 (2)
    • March 2014 (2)
    • February 2014 (2)
    • January 2014 (2)
    • December 2013 (2)
    • November 2013 (3)
    • October 2013 (2)
    • September 2013 (2)
    • August 2013 (2)
    • July 2013 (2)
    • June 2013 (2)
    • May 2013 (2)
    • April 2013 (2)
    • March 2013 (2)
    • February 2013 (2)
    • January 2013 (3)
    • December 2012 (2)
    • November 2012 (2)
    • October 2012 (2)
    • September 2012 (2)
    • August 2012 (2)
    • July 2012 (2)
    • June 2012 (2)
    • May 2012 (2)
    • April 2012 (2)
    • March 2012 (2)
    • February 2012 (2)
    • January 2012 (3)
    • December 2011 (2)
    • November 2011 (2)
    • October 2011 (2)
    • September 2011 (2)
    • August 2011 (2)
    • July 2011 (2)
    • June 2011 (2)
    • May 2011 (2)
    • April 2011 (3)
    • March 2011 (2)
    • February 2011 (2)
    • January 2011 (2)
    • December 2010 (2)
    • November 2010 (3)
    • October 2010 (2)
    • September 2010 (2)
    • August 2010 (2)
    • July 2010 (2)
    • June 2010 (2)
    • May 2010 (2)
    • April 2010 (2)
    • March 2010 (3)
    • February 2010 (2)
    • January 2010 (2)
    • December 2009 (2)
    • November 2009 (2)
    • October 2009 (2)
    • September 2009 (1)
    • August 2009 (4)
    • July 2009 (2)
    • June 2009 (2)
    • May 2009 (3)
    • April 2009 (2)
    • March 2009 (3)
    • February 2009 (3)
    • January 2009 (1)
    • December 2008 (4)
    • November 2008 (2)
    • October 2008 (2)
    • September 2008 (2)
    • August 2008 (2)
    • July 2008 (2)
    • June 2008 (3)
    • May 2008 (2)
    • April 2008 (3)
    • March 2008 (2)
    • February 2008 (3)
    • January 2008 (4)
    • December 2007 (10)
    • October 2007 (4)
    • September 2007 (3)
    • August 2007 (2)
    • July 2007 (2)
    • June 2007 (6)
    • May 2007 (2)
    • April 2007 (2)
    • March 2007 (2)
    • February 2007 (14)
  • Categories

    • Business (81)
    • Compliance (59)
    • Computer Forensics (21)
    • Methodology (47)
    • Security Architecture (194)
    • Security metrics (4)
    • Speaker (10)
    • Technology (18)
    • Uncategorized (13)
  • Tags

  • Pages

    • About
    • Crowmoor Consultants
    • Jericho Books

crowmoor.se © 2023 All Rights Reserved.

WordPress Themes | Web Hosting Bluebook