Our security consultants possess high level of knowledge and expertise that has been acquired through many years of professional work and constant training in the fields of information security, risk management, infrastructure implementation, systems integration and provision of internet services.

Moreover, our high standards of technical knowledge and skills are backed-up by the variety of professional certifications our security consultants have acquired from vendor independent and well respected institutions, associations and organizations. Furthermore, the majority of our security consultants hold at least one technical certification in information security, rendering SecureON the most qualified company providing technical security assessments in Slovenia.

Our Experience

  • Financial activities (SOC, SIEM, payment card operations)

  • Insurance (information security, business continuity, SIEM)

  • Healthcare (information security, SIEM)

  • Production industry (information security, continuous operation)

  • Service providers (information security)

Our Certificates

  • IRCA_ISO27001 (Information Security Management Systems Auditor – Lead Auditor)

  • ISO 27001 Internal Auditor

  • ECC-CEH Certified Ethical Hacker

  • Splunk Core Certified Power User

  • CISA (Certified Information Systems Auditor)

  • Certified Information Security Manager (CISM)

  • Certified in Risk and Information Systems Control (CRISC)

  • CompTIA Cysa+

  • MCSE: Core Infrastructure

We are registered with the Slovenian Digital Innovation Hub as a provider of subsidized System Security Inspection and Penetration Testing. More at:

  •  https://dihslovenia.si/smernice/sistemski-varnostni-pregled
  •  https://dihslovenia.si/smernice/penetracijsko-testiranje

Our main activities:

  •  Information security according to ISO / IEC 27001 recommendations and the results ofbest practice:
    •  risk analysis and risk treatment with action plan,
    • information security processes modeling,
    • elaboration of information security policies,
    • implementation of security policies,
    • introduction and implementation of ISMS (information security management system),
    • regular control of user accounts changes,
    • regular control of physical access controls,
    • continuous improvement of information security with regular updating of security policies and instructions.
  •  ensuring compliance with the legislation on the protection of personal data (GDPR),
  •  participation in internal and external audits,
  •  ensuring business continuity:
    •  inventory of information sources,
    • BIA (business impact analysis),
    •  determining the required recovery times,
    •  business continuity management processes modeling,
    •  preparation of policies and instructions,
    •  planning and conducting business continuity tests,
    •  continuous improvement of business continuity with regular updating of policies and instructions.
  •  outsourcing the security engineer’s function,
  •  education and awareness of employees,
  •  vulnerability assessments,
  •  penetration tests,
  •  cooperation in the development of new information solutions (security aspect),
  •  participation in the operation of the SOC (security operational center),
  •  participation in the security incidents analysis and solving,
  •  security information and event management (SIEM).