Benefits Perform your IT risk assessments in a straightforward manner ISDP Tool leverages threat modelling techniques to enable the identification of relevant threats scenarios and associated security countermeasures to any information system in an automatic manner, with the right level of granularity Provide the CEO with reliable security indicators to allow for sound strategic decision making ISDP Tool’s supported approach is based on concrete data from the field, allowing to streamline the corporate information security risk management process. Executives benefit from tangible elements about the IT environment vulnerabilities and risky portions to effectively support their strategic decision making Manage information security and data privacy simultaneously ISDP Tool associates the processes of information security and data privacy management in a unique workstream in order to optimize the corresponding workload Highlights Methodological references Base your risk assessment approach upon well-known techniques and standards Automation Document applicable threats and associated mitigating controls to any information system Output optimisation Output optimisation : Filter mature and non-specific controls to reduce the output of your risk assessments Granularity of controls Adapt the granularity of your recommendations for security controls implementation Eased GDPR compliance Maintain your Records of Processing Activities easily and leverage them to identify your compliance tasks ISMS management Ease your internal audit process, continuous improvement approach, and provide reliable input for corporate IT risks evaluation Main Features and Videos All Dashboards Threats Reporting GDPR ProtectionProfile Collaboration Collaboration Dashboards Records of processing activities Embedded threat catalogue Protection profiles Reporting Three common challenges in information security and data privacy management This video explores three of the most frequently observed challenges faced by organizations with regards to information security and data privacy management Threat modelling explained & observed issues with existing automation tools This video is an introduction to threat modelling, including a concrete example. We will see how ISDPTool takes advantage of this powerful technique to improve the risk management process within organizations ISDPTool Demo : How to build an information security and data privacy concept (part I) This video shows how to generate an ISDP concept in five minutes based on the hacme casino application ISDPTool Demo : How to build an information security and data privacy concept (part II) This video shows how to follow-up the implementation of the security controls applying to the hacme casino application and produce meaningful statistics to evaluate residual risks Recent Blog Posts How ISDPTool eases compliance By Stéphane Adamiste 28 Nov 2020 Compliance FINMA circular 2008/21 : As per FINMA circular 2008/21 requirements, Swiss financial institutions shall document how they manage their operational risks arising from the technology Read More How the Information security By Stéphane Adamiste 31 Oct 2020 Information security management : The role of the information security function varies significantly from one organization to another. Read More How ISDPTool helps defining By Stéphane Adamiste 17 Oct 2020 ISO27001 risk treatment : As a security practitioner managing an ISO27001 ISMS, you may be confronted to the difficulty of elaborating an annual risk treatment plan, which defines Read More