Skip to content
logodnk

DNK Security

Security governance, risk management, and compliance (GRC) consulting services.

Build your compliance program

Accomplish your compliance requirement with maximum quality and minimum efforts

logoSOC2 - rond

SOC 1

SOC 1 is an engagement performed under SSAE 16 in which a service auditor reports on controls at a service organization that may be relevant to user entities' internal control over financial reporting.

logoSOC2 - rond

SOC 2

SOC 2 is an auditing procedure that ensures your service providers securely manage your data to protect the interests of your organization and the privacy of its clients. For security-conscious businesses, SOC 2 compliance is a minimal requirement when considering a SaaS provider. Developed by the American Institute of CPAs (AICPA), SOC 2 defines criteria for managing customer data based on five “trust service principles”—security, availability, processing integrity, confidentiality, and privacy.

iso27001 genss

ISO 27001

ISO/IEC 27001:2013 specifies the requirements for establishing, implementing, maintaining, and continually improving an information security management system within the organization's context. It also includes provisions for the assessment and treatment of information security risks tailored to the organization's needs.

ISO27701-1

ISO 27701

Elevate your marketing efforts with stunning collateral that leaves a lasting impression. From brochures and flyers to social media graphics, we'll design eye-catching materials that resonate with your target audience and drive results.

ISO27017-1

ISO 27017

This standard specifies requirements and guidelines for establishing, implementing, maintaining, and continually improving a Privacy Information Management System (PIMS) in the form of an extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy management within the context of the organization.

ISO27018-1

ISO 27018

This standard is essential for organizations worldwide responsible for Personally Identifiable Information (PII) processed in cloud services. It provides a framework on how to manage and process data and safeguard privacy. ISO 27018 enhances an already implemented information security management system to address privacy requirements and put the systems and infrastructure to support compliance to legislation, including GDPR.

GPDR

GDPR

The General Data Protection Regulation (GDPR) is a legal framework that sets guidelines for collecting and processing personal information from individuals who live in the European Union (EU). The General Data Protection Regulation (GDPR) is one of the most rigid privacy and security laws globally. Through it was drafted and passed by the European Union (EU), it imposes obligations onto organizations anywhere, so long as they target or collect data related to people in the EU.

CCPA

CCPA

The CCPA imposes many obligations on businesses similar to those required by the General Data Protection Regulation (GDPR) enacted by the European Union (EU). Nonetheless, a company that already complies with the GDPR may have additional obligations under the CCPA.

HIPAA

HIPAA

The Health Insurance Portability and Accountability Act (HIPAA) sets the standard for sensitive patient data protection. The Privacy and Security Rules define requirements for handling all electronic personal health information (e-PHI). Personal health information (PHI) represents any health data that includes identifying information (e.g., name, address, health conditions). Further, under HIPAA, healthcare organizations can no longer request Social Security numbers (SSN) as part of their data collection.

Dan Nakache

Founder & CEO

  • Former Manager in the IT Risks department in EY, Tel-Aviv.

  • Over 4 years of IT experience, performing SOC reports and ISO consulting for hundreds of companies across the world.

  • Areas of expertise: SOC reports, ISO certification, Privacy, HIPAA Assessment, GRC management, Compliance platform implementation

עיצוב ללא שם-4

Our Customers is our Success

Contact us