Goals that define B&SiT

Our professionals forged their experience working for top-level consultancies and companies.Their knowledge is endorsed by different international certifications, such as CISSP (ICS2), ISO 27001 Audit and Implementation, CISM / CISA (ISACA) and certifications in various leading security technologies and they are professors in different university chairs.
Our professionals forged their experience working for top-level consultancies and companies.Their knowledge is endorsed by different international certifications, such as CISSP (ICS2), ISO 27001 Audit and Implementation, CISM / CISA (ISACA) and certifications in various leading security technologies and they are professors in different university chairs.
Protect digital assets that are essential and critical for organizations. Generate value in the Information Technology area. Safeguard information from damage or loss, use, modification or unauthorized disclosure by implementing logical and physical access controls that ensure that information assets are protected.
800

Cybersecurity projects carried out

20

Active monitoring of technological infrastructures

500

IT Governance Projects/Information Security

Security Risks

Information Security

It's an important specialization for both public and private sector businesses, and for protecting critical infrastructure. In these sectors, information security will function as a facilitator to avoid or reduce relevant risks.

Currently

Currently, there is a broad consensus that the risks related to information security and data privacy have a high impact on the business, which can generate financial losses, as well as damage to the reputation and operational capacity of companies and organizations.

Shareholders

Shareholders, customers and business partners expect these risks to be adequately covered, encompassing not only the security of information systems but also compliance with laws and regulations and as well as corporate governance.

Our Services

Cloud strategies

Development of a cloud adoption strategy, whether public, private or hybrid, to achieve cost reduction and agility using the right balance between technology and services. cloud adoption strategy.

  • On-premise service migration.
  • Implementation of DLP tools.
  • Sizing and management.
  • Migrations to Office365.
  • Design and assembly of tenants in Azure and AWs.
  • Change management.
  • CASB solutions.
Risk Analysis

B&SiT has developed services that allow planning, development and measurement of the Information Security Management Systems in a correct way. To do this, we manage risks and information security to manage the level of acceptable corporate risk.

Our role is to advise, help, prepare and improve Risk and Security Management in your company.

  • Security Management System
  • Development of the Master Plan and Strategic
  • Plan for Information Security
  • Dashboard / Dashboard for Information Security
  • Risk management
Continuity Plan

The concept of Continuity Plans has become in a short time a key component of the Management Strategy aimed at having functionalities that guarantee being able to continue operating in the face of crises, or even events of extreme magnitude that compromise the services provided by the IT infrastructure and the information it maintains.

That is why the related services cover the full or partial implementation of the Business Continuity and Disaster Recovery Management System in an effective and efficient way, which responds to possible incidents that could jeopardize the continuity of the critical activities of the organization. These services cover the entire life cycle of a Business Continuity process, that is, the diagnosis, evaluation, development, implementation and start-up of each of the stages of Risks, Business Impact Analysis, Development of Plans, Testing, Awareness, Training and Maintenance.

  • Business continuity program administration
  • Development of business continuity plans (“BCP”) and
  • Technological Disaster Recovery (“DRP”)
  • Training and Testing of the Continuity Program, to ensure maintaining the business continuity capabilities, and sustaining compliance with shareholder and regulatory requirements over time
Scurity Assessment

We evaluate and manage technological environments to identify the
real state in terms of application security, also the platform that
supports it, networks and security controls.

Our services include the evaluation, diagnosis and resolution of:

  • Perimeter architecture.
  • Internal and external intrusion test.
  • Technological platforms.
  • Forensic analysis.
  • Web applications.
  • Vulnerabilities of the source code and technologies used for smartphones and tablets.
  • Evaluation of information security areas.
IT Personnel

We have a team of specialists in search of IT personnel: We provide advice on Human Resources. We take the time to get to know the companies that call us. We prepare an adjusted proposal for each need. In them, we contemplate objectives, modality and stipulate working time.

We base the services on the following axes:

  • Search and Selection of personnel.
  • Recruitment and selection by Competencies
  • Head hunting
  • Psychotechnical and Potential Assessment

Organizational Consulting. Organizational diagnosis, coping with crisis situations, overcoming and managing Change.
Trainings and trainings to achieve teamwork, with creative and flexible professionals. Search for talents to enhance the strengths of each member of the organization.

Consulting Services

Consulting and advisory services allow us to develop diagnosis, gap analysis, implementation and audit for compliance with national and international regulations.

International Standards that stand out:

  • Computer Security Assessments
  • Advice on International standards (ISO 17799 - BS7799 - ISO / IEC 27001).
  • Consulting and advice on BCRA regulations ("A" 4609/5374)
  • Consulting and advice in Payment Card Industry Data
  • Security Standard (PCI-DSS)
  • Advice on Protection of Personal Data (Law 25,326)
  • HIPPA (Health Insurance Portability and Accountability Act)
  • COBIT (Control Objectives for Information and related Technology)

It's about implementing and maintaining "best practices" based on our know-how through advice on the design, installation and configuration of a wide range of Computer Security components that allow us to have a complete and objective vision of the levels of information security to protect the company's computing assets by reducing risks to acceptable levels.

  • Computer security outsourcing service
  • Data and privacy control
  • Change management control
  • Data analysis with CAAT's tools
  • Employee awareness and training
  • Information Classification
  • Risk management
  • Formation of Incident Response Teams
  • Government of Computer Security and Information Security
  • Application security and control
  • Identity management (authentication, authorization and auditing)
Scurity Assessment

We evaluate and manage technological environments to identify the real state in terms of application security, also the platform that supports it, networks and security controls.

Our services include the evaluation, diagnosis and resolution of:

  • Perimeter architecture.
  • Internal and external intrusion test.
  • Technological platforms.
  • Forensic analysis.
  • Web applications.
  • Vulnerabilities of the source code and technologies used for smartphones and tablets.
  • Evaluation of information security areas.
Computer fraud Advices
  • Assistance in the selection of Fraud detection and Money Laundering and Terrorism Financing Prevention Systems.
  • Advice on the self-assessment of risks for compliance with the different existing regulations.
  • Review and audit in processes of face-to-face identification of clients.
  • Automation of list processes and filtering of negative news.
  • Standardization of regulatory reports.
  • Elaboration of Norms and Procedures according to current regulations.

Brands we trust

We provide a combination of excellence between specialized technical knowledge and state-of-the-art computer security technologies in which we place trust and efficient processes, adaptation and integration to the particular needs of each company.

Specialized Training

Our trainers have a University Professor degree or certificates in the subject and have significant experience.

Authorized Partner

B&SIT Partners

LICENCIADO PABLO A. BUCCAFUSCA

Bachelor of Systems Analysis. He had the international certifications CISA (Certified Information Systems Auditor) and CISM (Certified Information Security Manager) granted by ISACA. For fifteen years he developed at PricewaterhouseCoopers in the areas of Information Systems Consulting, specializing in the area of ​​service companies.

INGENIERO DIEGO ROSENHAIN

Information systems engineer graduated from the National Technological University. He holds the international certifications Lead Auditor ISO / IEC 27001, CISSP (Certified Information Systems Security Professional), SAP Security, SonicWall Certified Trainer. He developed his career in PricewaterhouseCoopers in the areas of Consulting and Auditing of Information Systems.

Companies that trust B&SiT

Contact us

B&SIT SRL / Triunvirato Av. 3779 (C1431) Capital Federal – BS.AS. / Phone: (+5411) 2153-1009 / Email: info@bsit.com.ar

Para ofrecer las mejores experiencias, utilizamos tecnologías como las cookies para almacenar y/o acceder a la información del dispositivo. El consentimiento de estas tecnologías nos permitirá procesar datos como el comportamiento de navegación o las identificaciones únicas en este sitio. No consentir o retirar el consentimiento, puede afectar negativamente a ciertas características y funciones. Politica de Cookies - Politica de Privacidad - Politica de divulgacion responsable   
Privacidad