Skip to main content
Step 1

Brief Checklist of Core Security Aspects

The user is asked to conduct a brief checklist of core security aspects of the event organised. At the end of this step, the user will be aware of grey areas that require closer inspection before deploying one or more security options.

Step 2

Advanced Assessment of Grey Areas

The user assesses the grey zones identified in more detail to identify risks and vulnerabilities raised by using a security option within a scenario.

Step 3

Risks Mitigation Measures Required

The user maps out risk mitigation measures for the risks identified at Step 2.

Start by filling the form and help us with the security-privacy-cost evalution.