We will visualize the current security measures and create a roadmap for future security measures from the perspective of priority and cost-effectiveness.
CYBERGYM's "V-Sec" analyzes the security status of organizations in accordance with various industry guidelines, in addition to being aimed at the general industry, and develops a roadmap for security measures. It also supports the specific selection, implementation, and operation of each measure. It can be effectively utilized not only for the initial security measures of your own company and for improving security but also for the security management of related companies and the supply chain. V-Sec is listed in the "IPA Information Security Service Standards Compliant Service List." Guidelines adhered to: <V-Sec STandard> for the general industry NIST SP800-171, ISO27001, ISO27002, guidelines for risk assessment against advanced cyber attacks, various guidelines such as the Personal Information Protection Law <V-Sec FActory> for factories Guidelines for cyber-physical security measures in factories, Jidokai/ Bukokai guidelines, etc. <V-Sec HOspital> Ministry of Health, Labour and Welfare guidelines on safety management of medical systems, version 6.0
Inquire About This Product
basic information
You can choose from the following two types of plans. <Standard Plan> 【Implementation Details】 For a single location - Hearing survey from the administrator's side - Confirmation of current measures through hearings and network diagrams 【Purpose】 To analyze vulnerabilities and risk levels in the company's network, governance, and management from multiple perspectives: human, organizational, physical, and technical. <Premium Plan> 【Implementation Details】 For multiple locations - Hearing survey from the administrator's side - Confirmation of current measures through hearings and network diagrams - On-site investigation of actual conditions through hearings with field personnel 【Purpose】 In addition to the objectives of the Standard analysis, to investigate and analyze compliance with on-site rules and the discrepancies between on-site operations and rules. To consider reviewing rules that are burdensome to operations as an additional aspect. *Generally, what is referred to as an information security audit corresponds to the Premium plan. *We will conduct a risk analysis that delves deeper into cybersecurity than typical audits such as ISO 27001.
Price range
Delivery Time
※It varies depending on the plan, so please feel free to contact us.
Applications/Examples of results
For more details, please download the PDF or feel free to contact us.
catalog(1)
Download All CatalogsCompany information
We offer a diverse range of cybersecurity training programs aimed at various departments and roles, from the security division to management and general departments. Additionally, we provide comprehensive services to address your security-related challenges, including security assessments and investigations, security consulting, and various cybersecurity solutions. Please feel free to contact us if you have any requests.