Projects

Project Assignments

Your industry is always changing. There are constant opportunities and challenges for your organization. By no means do you always have the right expertise or sufficient capacity in-house to ensure secure operations and information management.

Trustforce has a carefully curated pool of professionals with diverse expertise available. This allows us to offer your organization project-based support to get your cyber security in order wich allows you to keep the focus on what is most important to your organization and trust in a secure working environment.

Een ai gegenereerde foto van een man die aan het hacken is op meerdere laptop ter gelijke tijd.

Our Completed Project Assignments

View a selection of our past projects and discover how we have used our expertise to achieve successful results for our clients.

From secure web development to digital marketing; our portfolio shows what we can achieve for you. Browse through our projects to get an idea of what we can do for you.

Trustforce collaboration with the EU and SCK CEN

Het logo van de Europese Unie
Het logo van Sck Cen

Trustforce has contributed its Cyber Security expertise to a consortium of international companies, led by the Belgian Nuclear Research Center (SCK CEN). The project carried out by the consortium was aimed at mitigating (cyber) security risks for critical infrastructures in the Middle East. Trustforce has developed tailor-made Cyber Security workshops and presented them on site to Lebanese, Jordanian and Iraqi delegations.

Trustforce at BZK-RDDI

Telephones showing the city

Trustforce operates on behalf of the BZK-RDDI of the Kingdom as a consultant in Information Security and Privacy / IAM. The National Program for Sustainable Digital Information Management (RDDI) supports the national government in ensuring the proper management of digital information throughout the Kingdom and making it sustainably accessible. Efforts are being made to establish nationwide regulations, guidelines, and DPIAs (Data Protection Impact Assessments). The national frameworks are to be evaluated by various C-councils (CIO, CISO, CDO, and CPO), after which they must be adhered to by the national departments.

Trustforce network segmentation at a financial multinational

Trustforce carried out a network segmentation project for a multinational in the financial industry, in which both the cloud environment and the on-premise data center were segmented based on different segmentation techniques. The segmentation was implemented at the business unit, DTAP environment and application level, the latter focusing on the “crown jewels” of the company. Trustforce was responsible for the segmentation design, firewall management, process documentation, reporting and communication to all stakeholders.

Diagram of the internet of things

Trustforce at ACM

The ACM is an independent regulator within the government that oversees various Dutch markets (such as energy, healthcare, post and telecom). The goal of the ACM is to promote well-functioning markets, orderly and transparent market processes and careful treatment of consumers. Within ACM, the CIO office is responsible for managing the ICT portfolio, framework setting and 2nd-line supervision in the areas of ICT, privacy, information security and information management. In the period 2023-2024 we provided the interim Security Manager/CISO working within the CIO-office as part the security team.

Implementation Baseline Informatie Security (BIO)

Implementation BIO within a central government organization.

Deployment of security officers and the project leader. Tasks included performing risk analyses, BIV classifications, advising on the implementation of organizational and technical measures.

Also performing a business impact analysis and the implementation of the business continuity plan, delivering security reports and supervising internal and external audits.

ISMS and NEN7510-certification

Implementation and realization of an ISMS for the purpose of a NEN7510 certification at a medium-sized healthcare institution.

Deployment of project leader. Tasks around performing risk analyses, BIV classifications, advising on the implementation of organizational and technical measures.

Also performing a business impact analysis and the implementation of the business continuity plan, delivering security reports and supervising internal and external audits.

Ethical hacking and pentesting

Execution of (periodic) pen tests at various clients within government, healthcare and business.

Deployment of (certified) ethical hackers and project leaders.

Work included drawing up test plans, performing pen tests and reporting.

Security Architecture

Realization security architecture at multinational industrial company.

Deployment of (technical) security specialists.

Work around privacy protection and Pentesting.
Focus on very high risk findings / new developments / Supplier connect for IT hosting environments worldwide (IoT, Scada, Data Centers, Cloud Services, PAAS, SAAS): including Azure, IBM, T-Systems, AT&T, TCS for most critical environments.

Compliance with GDPR, ISO27701 and ISO 27001

Implementation and realization ‘Privacy Information Management System (PIMS)’ and Information Security Management Systems (ISMS)’ at some SME organizations.

Deployment of privacy specialist and security officer.

Work included development of documentation (policy and implementation), setting up and implementation of awareness programs, performing risk analyses, advice and support in the implementation of organizational and technical measures, reporting.

Implementation of privacy solutions

Realization of various privacy-related solutions at multinational industrial company.

Deployment of privacy specialist and (technical) security specialists.

Privacy consultancy and implementation projects related to Office 365 implementation worldwide (email capture), public non-EU cloud issues, supplier access to personal information of employees.

Our Completed Project Assignments

View a selection of our past projects and discover how we have used our expertise to achieve successful results for our clients.

From secure web development to digital marketing; our portfolio shows what we can achieve for you. Browse through our projects to get an idea of what we can do for you.

Het logo van de Europese Unie

Trustforce has contributed its Cyber Security expertise to a consortium of international companies, led by the Belgian Nuclear Research Center (SCK CEN). The project carried out by the consortium was aimed at mitigating (cyber) security risks for critical infrastructures in the Middle East. Trustforce has developed tailor-made Cyber Security workshops and presented them on site to Lebanese, Jordanian and Iraqi delegations.

Het logo van Sck Cen

Trustforce carried out a network segmentation project for a multinational in the financial industry, in which both the cloud environment and the on-premise data center were segmented based on different segmentation techniques. The segmentation was implemented at the business unit, DTAP environment and application level, the latter focusing on the “crown jewels” of the company. Trustforce was responsible for the segmentation design, firewall management, process documentation, reporting and communication to all stakeholders.

Trustforce operates on behalf of the BZK-RDDI of the Kingdom as a consultant in Information Security and Privacy / IAM. The National Program for Sustainable Digital Information Management (RDDI) supports the national government in ensuring the proper management of digital information throughout the Kingdom and making it sustainably accessible. Efforts are being made to establish nationwide regulations, guidelines, and DPIAs (Data Protection Impact Assessments). The national frameworks are to be evaluated by various C-councils (CIO, CISO, CDO, and CPO), after which they must be adhered to by the national departments.

The ACM is an independent regulator within the government that oversees various Dutch markets (such as energy, healthcare, post and telecom). The goal of the ACM is to promote well-functioning markets, orderly and transparent market processes and careful treatment of consumers. Within ACM, the CIO office is responsible for managing the ICT portfolio, framework setting and 2nd-line supervision in the areas of ICT, privacy, information security and information management. In the period 2023-2024 we provided the interim Security Manager/CISO working within the CIO-office as part the security team.

Implementation BIO within a central government organization.

Deployment of security officers and the project leader. Tasks included performing risk analyses, BIV classifications, advising on the implementation of organizational and technical measures.

Also performing a business impact analysis and the implementation of the business continuity plan, delivering security reports and supervising internal and external audits.

Implementation and realization of an ISMS for the purpose of a NEN7510 certification at a medium-sized healthcare institution.

Deployment of project leader. Tasks around performing risk analyses, BIV classifications, advising on the implementation of organizational and technical measures.

Also performing a business impact analysis and the implementation of the business continuity plan, delivering security reports and supervising internal and external audits.

Execution of (periodic) pen tests at various clients within government, healthcare and business.

Deployment of (certified) ethical hackers and project leaders.

Work included drawing up test plans, performing pen tests and reporting.

Realization security architecture at multinational industrial company.

Deployment of (technical) security specialists.

Work around privacy protection and Pentesting.
Focus on very high risk findings / new developments / Supplier connect for IT hosting environments worldwide (IoT, Scada, Data Centers, Cloud Services, PAAS, SAAS): including Azure, IBM, T-Systems, AT&T, TCS for most critical environments.

Implementation and realization ‘Privacy Information Management System (PIMS)’ and Information Security Management Systems (ISMS)’ at some SME organizations.

Deployment of privacy specialist and security officer.

Work included development of documentation (policy and implementation), setting up and implementation of awareness programs, performing risk analyses, advice and support in the implementation of organizational and technical measures, reporting.

Realization of various privacy-related solutions at multinational industrial company.

Deployment of privacy specialist and (technical) security specialists.

Privacy consultancy and implementation projects related to Office 365 implementation worldwide (email capture), public non-EU cloud issues, supplier access to personal information of employees.

Interested?

With our range of various (new) services, we will encourage you to realize new solutions. We look forward to a long-term partnership with you with confidence.

Trustforce B.V.

© Copyright – 2024 Trustforce B.V.