{"id":1633,"date":"2017-08-21T13:16:52","date_gmt":"2017-08-21T11:16:52","guid":{"rendered":"https:\/\https://www.iczgroup.com/web.i.cz\/?page_id=1633\/"},"modified":"2020-04-28T15:46:05","modified_gmt":"2020-04-28T13:46:05","slug":"information-security-assurance-services","status":"publish","type":"page","link":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/information-security-assurance-services\/","title":{"rendered":"Information Security Assurance Services"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.4.2&#8243; background_color=&#8221;#003156&#8243; custom_padding=&#8221;0px||0px|&#8221; hover_enabled=&#8221;0&#8243; transparent_background=&#8221;off&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_margin=&#8221;0px||0px|&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; background_position=&#8221;top_left&#8221; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;]<div class=\"icz-submenu et_pb_submenu_0\"><div class=\"icz-submenu__wrap\"><a href=\"#purpose\" target=\"_self\">Purpose<\/a><a href=\"#features\" target=\"_self\">Features<\/a><a href=\"#products\" target=\"_self\">Products<\/a><a href=\"#references\" target=\"_self\">References<\/a><\/div><\/div>[\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243; background_color=&#8221;rgba(255,255,255,0)&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#d9f2fe&#8221; background_color_gradient_end=&#8221;#a6e2fa&#8221; background_color_gradient_type=&#8221;radial&#8221; custom_padding=&#8221;76.796875px|0px|76px|0px&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<h1 style=\"text-align: center\"><span style=\"color: #000000;font-family: Calibri\">Information Security Assurance Services <\/span><\/h1>\n<h1 style=\"text-align: center\"><\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<p style=\"text-align: center\"><span style=\"font-size: xx-large\"><strong>Effective data confidentiality, integrity, and availability assurance<\/strong><\/span><\/p>\n<p style=\"text-align: center\"><span style=\"font-size: large\">Considering the increasing reliance of everyday work and other activities on information technologies, the security of information systems has become a vital part of daily life.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_id=&#8221;zamereni&#8221; _builder_version=&#8221;3.22&#8243; background_color=&#8221;rgba(255,255,255,0)&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<h2 style=\"text-align: center\">AIM \/ PURPOSE OF THE SOLUTION, WHO IT IS GOOD FOR<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<p style=\"text-align: center\"><span lang=\"en-US\">If part or most of the activities of an organization depends on processing data in electronic form, it is vital to protect this data due to the continuous increase of threats to them. Requirements for data security assurance can result from both the internal needs of the organization &#8211; which understand the value of its data &#8211; and legislative or contractual obligations. Consequently, information security assurance applies to all organizations; the only difference is the scope and extent of the specific information security requirements.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_id=&#8221;charakteristika&#8221; _builder_version=&#8221;3.22&#8243; background_color=&#8221;rgba(255,255,255,0)&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#d9f2fe&#8221; background_color_gradient_end=&#8221;#a6e2fa&#8221; background_color_gradient_type=&#8221;radial&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<h2 style=\"text-align: center\">FEATURES, CHARACTERISTICS, AND FUNCTIONALITY OF THE SOLUTION<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<p style=\"text-align: center\"><span lang=\"en-US\">Regardless of the reason for implementing an information security assurance solution, the following stages should be adopted. During the analytic stage, the organization\u2019s needs are identified, as well as the current state of the environment with respect to security and the existing security measures. During the design stage, which often contains a risk assessment (analysis), additional security measures are proposed that satisfy the needs of the organization. The proposed organizational and technical measures are introduced during the subsequent implementation stage; policies and consequent security documentation, training, and processes are created. New tools are acquired or existing tools configured. During the operational stage, the security measures are administered, checked, and improved so that they reflect the development in the area with regard to threats, vulnerabilities, and legal requirements.<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_id=&#8221;dalsi-info&#8221; _builder_version=&#8221;3.22&#8243; background_color=&#8221;rgba(255,255,255,0)&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<h2 style=\"text-align: center\">ADDITIONAL INFORMATION, SUMMARY<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<p style=\"text-align: center\">ICZ consultants are qualified experts with internationally recognized CISM and CISA certificates; they are authorized for contact with restricted information of all levels, from Confidential to Top Secret.<br \/>\nWhen providing services, they always take into consideration the customer\u2019s needs. They draw not only on their experience but also on many practice-proven international standards or branch recommendations. They are also well aware of the fact that security is a process that is never finished; when they design security solutions, they ensure that the solutions are as easy to use and update as possible.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_id=&#8221;produkty&#8221; _builder_version=&#8221;3.22&#8243; background_color=&#8221;rgba(255,255,255,0)&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#d9f2fe&#8221; background_color_gradient_end=&#8221;#a6e2fa&#8221; background_color_gradient_type=&#8221;radial&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<h2 style=\"text-align: center\">List of products<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; column_structure=&#8221;1_3,1_3,1_3&#8243;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/09\/SEC_03_1.jpg&#8221; align=&#8221;center&#8221; align_tablet=&#8221;center&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;3.23&#8243; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;500ms&#8221; animation_intensity_slide=&#8221;10%&#8221; border_style=&#8221;solid&#8221; sticky=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<h3>Cyber Security<\/h3>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text]<div class=\"et_pb_blurb icon-next-to-text-wrapper et_pb_module et_pb_bg_layout_light  et_pb_icon_next_to_text_0\">\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t<div class=\"et_pb_blurb_content\">\r\n\t\t\t\t\t<div class=\"icon-next-to-text next-to-text-without-icon-corners\">\r\n                <div class=\"beside-icon-part\">\r\n                    <div class=\"et_pb_main_blurb_image\"><a href=\"#\"><span class=\"et-pb-icon \" style=\"color: #0593d3;\">s<\/span><\/a><\/div>\r\n                <\/div>\r\n                <div class=\"beside-text-part\"><strong><a href=\"https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/08\/ICZ_PL_SEC_Kybernetick\u00e1-bezpe\u010dnost_EN_1707_PRINT_01.pdf\">Product list to download<\/a><\/strong><br \/>\n<\/div>\r\n            <\/div> \r\n\t\t\t\t\t<div class=\"et_pb_blurb_container\">\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div> <!-- .et_pb_blurb_content -->\r\n\t\t\t<\/div> <!-- .et_pb_blurb -->[\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/08\/GDPR_All.png&#8221; align=&#8221;center&#8221; align_tablet=&#8221;center&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;3.23&#8243; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;500ms&#8221; animation_intensity_slide=&#8221;10%&#8221; border_style=&#8221;solid&#8221; sticky=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<h3>GDPR<\/h3>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text]<div class=\"et_pb_blurb icon-next-to-text-wrapper et_pb_module et_pb_bg_layout_light  et_pb_icon_next_to_text_1\">\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t<div class=\"et_pb_blurb_content\">\r\n\t\t\t\t\t<div class=\"icon-next-to-text next-to-text-without-icon-corners\">\r\n                <div class=\"beside-icon-part\">\r\n                    <div class=\"et_pb_main_blurb_image\"><a href=\"#\"><span class=\"et-pb-icon \" style=\"color: #0593d3;\">s<\/span><\/a><\/div>\r\n                <\/div>\r\n                <div class=\"beside-text-part\"><strong><a href=\"https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/08\/ICZ_PL_SEC_GDPR_A4_EN_1707_PRINT_01.pdf\">Product list to download<\/a><\/strong><br \/>\n<\/div>\r\n            <\/div> \r\n\t\t\t\t\t<div class=\"et_pb_blurb_container\">\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div> <!-- .et_pb_blurb_content -->\r\n\t\t\t<\/div> <!-- .et_pb_blurb -->[\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/09\/SEC_04_1.jpg&#8221; align=&#8221;center&#8221; align_tablet=&#8221;center&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;3.23&#8243; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;500ms&#8221; animation_intensity_slide=&#8221;10%&#8221; border_style=&#8221;solid&#8221; sticky=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<h3>eIDAS<\/h3>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text]<div class=\"et_pb_blurb icon-next-to-text-wrapper et_pb_module et_pb_bg_layout_light  et_pb_icon_next_to_text_2\">\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t<div class=\"et_pb_blurb_content\">\r\n\t\t\t\t\t<div class=\"icon-next-to-text next-to-text-without-icon-corners\">\r\n                <div class=\"beside-icon-part\">\r\n                    <div class=\"et_pb_main_blurb_image\"><a href=\"#\"><span class=\"et-pb-icon \" style=\"color: #0593d3;\">s<\/span><\/a><\/div>\r\n                <\/div>\r\n                <div class=\"beside-text-part\"><strong><a href=\"https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/08\/ICZ_NL_SEC_eIDAS_EN_1707_PRINT_01.pdf\">Product list to download<\/a><\/strong><br \/>\n<\/div>\r\n            <\/div> \r\n\t\t\t\t\t<div class=\"et_pb_blurb_container\">\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div> <!-- .et_pb_blurb_content -->\r\n\t\t\t<\/div> <!-- .et_pb_blurb -->[\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; column_structure=&#8221;1_3,1_3,1_3&#8243;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_image src=&#8221;https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/08\/blok-isms-300&#215;200-1.jpg&#8221; align=&#8221;center&#8221; align_tablet=&#8221;center&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;3.23&#8243; animation_style=&#8221;slide&#8221; animation_direction=&#8221;left&#8221; animation_duration=&#8221;500ms&#8221; animation_intensity_slide=&#8221;10%&#8221; border_style=&#8221;solid&#8221; sticky=&#8221;off&#8221; always_center_on_mobile=&#8221;on&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;]<\/p>\n<h3>ISMS<\/h3>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text]<div class=\"et_pb_blurb icon-next-to-text-wrapper et_pb_module et_pb_bg_layout_light  et_pb_icon_next_to_text_3\">\r\n\t\t\t\t\r\n\t\t\t\t\r\n\t\t\t\t<div class=\"et_pb_blurb_content\">\r\n\t\t\t\t\t<div class=\"icon-next-to-text next-to-text-without-icon-corners\">\r\n                <div class=\"beside-icon-part\">\r\n                    <div class=\"et_pb_main_blurb_image\"><a href=\"#\"><span class=\"et-pb-icon \" style=\"color: #0593d3;\">s<\/span><\/a><\/div>\r\n                <\/div>\r\n                <div class=\"beside-text-part\"><strong><a href=\"https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/08\/ICZ_PL_SEC_ISMS_EN_1707_PRINT_01.pdf\">Product list to download<\/a><\/strong><br \/>\n<\/div>\r\n            <\/div> \r\n\t\t\t\t\t<div class=\"et_pb_blurb_container\">\r\n\t\t\t\t\t\t\r\n\t\t\t\t\t<\/div>\r\n\t\t\t\t<\/div> <!-- .et_pb_blurb_content -->\r\n\t\t\t<\/div> <!-- .et_pb_blurb -->[\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; module_id=&#8221;reference&#8221; _builder_version=&#8221;3.22&#8243; background_color=&#8221;rgba(255,255,255,0)&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243;]<\/p>\n<h2 style=\"text-align: center\">Reference<\/h2>\n<p>[\/et_pb_text]<div class=\"icz-reference et_pb_icz_reference_0\"><div class=\"reference-list\"><div class=\"row\"><div class=\"col-sm-6 col-md-3 reference-item visible format-standard\" data-reference-filter=\"[73]\"><a href=\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/pa-reference\/kyberneticka-bezpecnost\/\" class=\"reference-item__image\"style=\"background-image: url(https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/09\/SEC_03_1-1024x657.jpg);\"><\/a><h3 class=\" reference-item__title\"><a href=\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/pa-reference\/kyberneticka-bezpecnost\/\">Cyber Security<\/a><\/h3><div class=\"reference-item__excerpt\">The goal of the project was to meet the requirements of Act on Cyber Security, and of related Decrees.<\/div><\/div><div class=\"col-12 no-reference\"><span class=\"no-reference__text\"><i class=\"fa fa-info-circle\"><\/i> No reference found based on filters.<\/span><\/div><\/div><\/div><\/div>[\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.4.2&#8243; background_color=&#8221;#003156&#8243; custom_padding=&#8221;0px||0px|&#8221; hover_enabled=&#8221;0&#8243; transparent_background=&#8221;off&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_margin=&#8221;0px||0px|&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; background_position=&#8221;top_left&#8221; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;3.22&#8243; background_color=&#8221;rgba(255,255,255,0)&#8221; use_background_color_gradient=&#8221;on&#8221; background_color_gradient_start=&#8221;#d9f2fe&#8221; background_color_gradient_end=&#8221;#a6e2fa&#8221; background_color_gradient_type=&#8221;radial&#8221; custom_padding=&#8221;76.796875px|0px|76px|0px&#8221;][et_pb_row _builder_version=&#8221;3.25&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;3.25&#8243; custom_padding=&#8221;|||&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;] Information Security Assurance Services [\/et_pb_text][et_pb_text _builder_version=&#8221;3.27.4&#8243; border_style=&#8221;solid&#8221;] Effective data confidentiality, integrity, and availability assurance Considering the increasing reliance of everyday &hellip; <a href=\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/information-security-assurance-services\/\">Continued<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":1510,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v18.4.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Information Security Assurance Services &bull; ICZ Group<\/title>\n<meta name=\"description\" content=\"Information Security Assurance Services Effective data confidentiality, integrity, and availability assurance Considering the increasing reliance of\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/information-security-assurance-services\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security Assurance Services &bull; ICZ Group\" \/>\n<meta property=\"og:description\" content=\"Information Security Assurance Services Effective data confidentiality, integrity, and availability assurance Considering the increasing reliance of\" \/>\n<meta property=\"og:url\" content=\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/information-security-assurance-services\/\" \/>\n<meta property=\"og:site_name\" content=\"ICZ Group\" \/>\n<meta property=\"article:modified_time\" content=\"2020-04-28T13:46:05+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#organization\",\"name\":\"ICZ Group\",\"url\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/07\/icz-logo.png\",\"contentUrl\":\"https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/07\/icz-logo.png\",\"width\":96,\"height\":47,\"caption\":\"ICZ Group\"},\"image\":{\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#website\",\"url\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/\",\"name\":\"ICZ Group\",\"description\":\"ICZ Group\",\"publisher\":{\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/information-security-assurance-services\/#webpage\",\"url\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/information-security-assurance-services\/\",\"name\":\"Information Security Assurance Services &bull; ICZ Group\",\"isPartOf\":{\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#website\"},\"datePublished\":\"2017-08-21T11:16:52+00:00\",\"dateModified\":\"2020-04-28T13:46:05+00:00\",\"description\":\"Information Security Assurance Services Effective data confidentiality, integrity, and availability assurance Considering the increasing reliance of\",\"breadcrumb\":{\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/information-security-assurance-services\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/information-security-assurance-services\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/information-security-assurance-services\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Products and Services\",\"item\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security\",\"item\":\"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Information Security Assurance Services\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security Assurance Services &bull; ICZ Group","description":"Information Security Assurance Services Effective data confidentiality, integrity, and availability assurance Considering the increasing reliance of","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/information-security-assurance-services\/","og_locale":"en_US","og_type":"article","og_title":"Information Security Assurance Services &bull; ICZ Group","og_description":"Information Security Assurance Services Effective data confidentiality, integrity, and availability assurance Considering the increasing reliance of","og_url":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/information-security-assurance-services\/","og_site_name":"ICZ Group","article_modified_time":"2020-04-28T13:46:05+00:00","twitter_card":"summary","twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#organization","name":"ICZ Group","url":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#logo","inLanguage":"en-US","url":"https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/07\/icz-logo.png","contentUrl":"https:\/\https://www.iczgroup.com/web.i.cz\/wp-content\/uploads\/2017\/07\/icz-logo.png","width":96,"height":47,"caption":"ICZ Group"},"image":{"@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#logo"}},{"@type":"WebSite","@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#website","url":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/","name":"ICZ Group","description":"ICZ Group","publisher":{"@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/information-security-assurance-services\/#webpage","url":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/information-security-assurance-services\/","name":"Information Security Assurance Services &bull; ICZ Group","isPartOf":{"@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/#website"},"datePublished":"2017-08-21T11:16:52+00:00","dateModified":"2020-04-28T13:46:05+00:00","description":"Information Security Assurance Services Effective data confidentiality, integrity, and availability assurance Considering the increasing reliance of","breadcrumb":{"@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/information-security-assurance-services\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/information-security-assurance-services\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/information-security-assurance-services\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/"},{"@type":"ListItem","position":2,"name":"Products and Services","item":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/"},{"@type":"ListItem","position":3,"name":"Security","item":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/products-and-services\/security\/"},{"@type":"ListItem","position":4,"name":"Information Security Assurance Services"}]}]}},"_links":{"self":[{"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/pages\/1633"}],"collection":[{"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/comments?post=1633"}],"version-history":[{"count":19,"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/pages\/1633\/revisions"}],"predecessor-version":[{"id":18255,"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/pages\/1633\/revisions\/18255"}],"up":[{"embeddable":true,"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/pages\/1510"}],"wp:attachment":[{"href":"https:\/\https://www.iczgroup.com/web.i.cz\/en\/wp-json\/wp\/v2\/media?parent=1633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}