DM11 Contact us
For your company

Meet audit and regulatory

In a growing digital environment, we are always aware of the validity of laws and regulations that seek to promote data protection and the security of business activities.

At the same time, various sets of good security and privacy practices have emerged, designed to provide effective tools to mitigate new threats that accompany rapid technological advancement.

Given this complex reality, DM11® offers its expertise to assist your business in facing this challenge. This includes support in compliance with major laws and current regulations, as well as preparation to adopt the most suitable guidelines related to information security, data protection and cybersecurity.

DM11® is your partner in developing strategies that strengthen posture and adequacy in the face of these requirements, allowing your company to prosper with confidence in the rapid technological transformations.

Services

ISO

International Organization for Standardization is a non -governmental organization that develops and publishes technical standards that are designed to standardize processes, products and services in various industries and fields, with the objective of ensuring quality, safety, efficiency and interoperability. Compliance with its ISO standards is seen as a demonstration of commitment to excellence and continuous improvement in a given area.

  • 27.001

  • 27.002

  • 27.003

  • 27.004

  • 27.005

  • 27.014

  • 27.301

  • 27.701

  • 31.000

  • 38.500

  • 20.000

International standard that establishes requirements for an Information Security Management System (ISMS) and provides recommended guidelines and practices to help organizations establish, implement, maintain and improve information security within their structures.

ISO
27.001

Supplier audit service

We structure its processes for the care of information security audit required by financial institutions as well as other partner entities and/or suppliers rights or through external auditors such as:

01

Financial sector

Assistance to audits and compliance requirements of financial sector institutions such as BV Financeira, Santander, Itaú, Safra bank, BTG and Febraban for bank correspondents.

02

Industry and Commerce

Response to compliance requirements and supplier audits in industry and commerce such as free market, cosan, PSA, GM etc.

03

ITGRC Big Four

Audit attendance in IT Governance, Risk & Compliance for largest specialized audit and consulting companies in the world - Big Four (EY - Deloitte - PWC - KPMG).

04

Due Diligence

We enable your service to Due Diligence audit in telemarketing and benefit companies.

Bacen - Central Bank of Brazil

Bacen - Central Bank of Brazil

CMN RESOLUTION No. 4,893 /2021

Resolution that provides for the cyber security policy and the requirements for hiring data processing and storage services and cloud computing to be observed by authorized institutions to operate by the Central Bank of Brazil (BCB).

BCB RESOLUTION No. 85 / 2021

Provides for the cyber security policy and the requirements for hiring data processing and storage services and cloud computing to be observed by the payment institutions authorized to operate by the Central Bank of Brazil (BCB).

Payment Card Industry - Data Security Standard (PCI DSS)

Payment Card Industry - Data Security Standard (PCI DSS)

Talk to an expert

Set of security guidelines that must be followed by companies that take card data such as number, bearer’s name, validity and CVV having their certification normally required by payment processing companies, banks and financial institutions, card service providers and, suppliers of outsourced services.

Failure to comply with PCI DSS guidelines can result in fines, penalties and potential loss of customer confidence.

System and Organization Controls (SOC) 2

System and Organization Controls (SOC) 2

Talk to an expert

Global standard for data insurance handling, evaluates how a company compromises and implements internal controls around one or more of the reliable service criteria of the American Institute of Certified Public Accountants (AICPA) in relation to availability, security, integrity of processing, confidentiality and privacy.

SOC 2 evaluation is important for any organization involved in services that require data sharing, and may even become a competitive differential against competition.

National Institute of Standards and Technology - Cybersecurity Framework (NIST CSF)

National Institute of Standards and Technology - Cybersecurity Framework (NIST CSF)

Talk to an expert

Set of recommended guidelines, standards and practices developed by the National Institute of Standards and Technology (NIST) created to help organizations improve their cyber security and strengthen resilience against cyber threats.

The NIST CSF provides a comprehensive structure that allows organizations to identify, protect, detect, respond and recover from cyber security incidents. It is flexible and can be adapted to meet the specific needs of different sectors and sizes of organizations.

NIST Special Publication (SP) 800-171

NIST Special Publication (SP) 800-171

Talk to an expert

Set of cyber security guidelines also developed by the National Institute of Standards and Technology (NIST) of the United States aimed at organizations dealing with information controlled by the US Federal Government, but are also applied to organizations that wish to enhance their cyber security.

The SP 800-171 focuses on the protection of controlled information, which may include sensitive data not classified but still critical for national security. It establishes a series of cyber security controls that organizations must implement to properly protect this information.

General Personal Data Protection Law (LGPD)

General Personal Data Protection Law (LGPD)

Talk to an expert

In force since September 2020, LGPD is Brazilian law that regulates how organizations should deal with personal data. LGPD establishes rights and duties regarding the processing of personal information and seeks to protect the privacy and security of individual data.

General Data Protection Regulation (GDPR)

General Data Protection Regulation (GDPR)

Talk to an expert

The General Data Protection Regulation (GDPR) has been in force since 2018, has established comprehensive rules for the processing of personal data throughout the European Union and in the European Economic Space (EEE) being a set of rules on privacy valid for the entire Union European but also affects people in other parts of the world, including Brazil.

Center for Internet Security (CIS) Controls

Center for Internet Security (CIS) Controls

Talk to an expert

Center for Internet Security (CIS) critical security controls is a prescriptive and prioritized set of recommended cyber security practices and defensive actions that can help prevent the most dangerous and disseminated attacks, in addition to supporting compliance with various models of good safety practices.

Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM)

Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM)

Talk to an expert

A Cloud Control Matrix (CCM) structured in 17 domains that cover key aspects of cloud technology. It can be used to systematically evaluate a cloud implementation as well as provide guidance on which safety controls should be implemented by which actor within the cloud ecosystem.

Control Objectives for Information Technology (COBIT)

Control Objectives for Information Technology (COBIT)

Talk to an expert

Guide to good practices that provides a business and management vision for the governance and control of corporate IT, which demonstrates the central role of IT in creating value for the organization. Using CoBIT, we can carry out a comprehensive diagnosis of IT maturity, including the following domains: top management responsibilities, planning and organization, project and change management, operations and security management, process monitoring.

Information Technology Infrastructure Library (ITIL)

Information Technology Infrastructure Library (ITIL)

Talk to an expert

Reference Guide for Good Practices in TI qualified services management.
The recommended practices in ITIL are grouped in the categories: general management practices (IT governance); Service management practices (catalog, service level, availability, incidents, problems, configuration, etc.) and technical management practices (implementation, infrastructure, etc.).

Verband der Automobilindustrie-Information Security Assessment | Trusted Information Security Assessment Exchange (VDA-ISA | TISAX )

Verband der Automobilindustrie-Information Security Assessment | Trusted Information Security Assessment Exchange (VDA-ISA | TISAX )

Talk to an expert

Global information security standard for the automotive industry. It combines the former Information Security Rules of the German Verband der Automobilindustrie (VDA) with ISO/IEC 27001 Appendix A (Technical Controls) as well as some Privacy requirements.

International Automotive Task Force – Automotive Cyber Security (IATF)

International Automotive Task Force – Automotive Cyber Security (IATF)

Talk to an expert

IATF develops standards and guidelines related to cyber safety in the auto industry.
The IATF 16949: 2016 standard focuses on protection against cyber threats in automotive systems, aiming to ensure safety of vehicles and passengers and incorporate guidelines such as unauthorized access to vehicle control systems, detection and response to incidents of cyber safety and the guarantee that automotive supply chain suppliers also meet these requirements.

International Air Transport Association (IATA)

International Air Transport Association (IATA)

Talk to an expert

IATA is a global association that represents commercial airlines around the world founded in 1945 that acts as an international trade entity for the aviation industry and plays an important role in the regulation, safety and efficiency of global aviation.

HITRUST Cybersecurity Framework

HITRUST Cybersecurity Framework

Talk to an expert

Good cybersecurity model developed by the Hitrust organization (USA) in collaboration with health, technology and information security organizations, combining regulations and relevant market standards such as ISO, NIST, PCI, GDPR and others in a comprehensive and flexible model of security and privacy..

National Cyber Security Centre | Cyber Assessment Framework (NCSC | CAF)

National Cyber Security Centre | Cyber Assessment Framework (NCSC | CAF)

Talk to an expert

Model of good cybersecurity practices developed by the UK NCSC, based on security and resilience principles defined in terms of results, ie the definition of what needs to be achieved instead of a checklist of what needs to be done.

Trusted Partner Network (TPN)

Trusted Partner Network (TPN)

Talk to an expert

Motion Picture Association (MPA) global initiative for content security and television content security. TPN maintains MPA Content Security Best Practices and establishes a minimum standard of security preparation. It is applicable to all sector suppliers and partners.

  • ISO
  • Service and audits
  • BACEN
  • PCI-DSS
  • SOC 2
  • NIST CSF
  • NIST SP 800-171
  • LGPD
  • GDPR
  • CIS Controls
  • CSA CCM
  • COBIT
  • ITIL
  • VDA-ISA | TISAX
  • IATF
  • IATA
  • HITRUST
  • NCSC | CAF
  • TPN
NosConformes®

With NosConformes®, DM11® identifies and qualifies regulatory and compliance obligations to which your company needs to meet. Then all the requirements and structured congruences are studied to optimize a planning, service and monitoring model of compliance processes to which your organization applies, thus saving the time, reinvestments and wear and tear of your team.

Contact