// Dienstverlening // Services

Onze Diensten

Our Services

End-to-end oplossingen voor enterprise IT governance, risk management en security. Van strategie tot implementatie.

End-to-end solutions for enterprise IT governance, risk management and security. From strategy to implementation.

🔐

SAP Security & GRC

Complete SAP GRC implementaties, access control, segregation of duties (SoD), emergency access management en compliance reporting. Van design tot go-live support.

Complete SAP GRC implementations, access control, segregation of duties (SoD), emergency access management and compliance reporting. From design to go-live support.

  • SAP GRC Access Control & Process Control
  • SoD matrix design & rulesets
  • Risk analysis & remediation
  • Emergency access workflows (EAM/Fire fighter)
  • Compliance monitoring & reporting
🏗️

ERP Transformaties

ERP Transformations

Begeleiding van grote ERP programma's met focus op security, governance en risk management. Van S/4HANA migraties tot SAP Business Technology Platform implementaties.

Guidance for large-scale ERP programs with a focus on security, governance and risk management. From S/4HANA migrations to SAP Business Technology Platform implementations.

  • S/4HANA security blueprints
  • Role design & authorization concept
  • Data migration security
  • SAP BTP governance
  • Cloud security & compliance
⚖️

IT Governance, Risk & Compliance

Strategische IT GRC frameworks, policy development, risk assessments en compliance programma's afgestemd op uw organisatie en regelgeving (AVG, NIS2, DORA, EU AI Act, ISO 27001).

Strategic IT GRC frameworks, policy development, risk assessments and compliance programs tailored to your organization and regulatory requirements (GDPR, NIS2, DORA, EU AI Act, ISO 27001).

  • IT governance framework design
  • Risk assessment & treatment plans
  • DORA readiness & implementation
  • NIS2 compliance & gap analyses
  • EU AI Act risk classification & compliance
  • Policy & procedure development
  • Third-party risk management
👤

Identity & Access Management

Enterprise IAM strategie en implementatie, role-based access control (RBAC), privileged access management (PAM) en identity governance & administration (IGA).

Enterprise IAM strategy and implementation, role-based access control (RBAC), privileged access management (PAM) and identity governance & administration (IGA).

  • IAM strategy & roadmap
  • Role design & role mining
  • Access certification campaigns
  • Privileged access management
  • Single Sign-On (SSO) & MFA
🔍

IT Audit & Assurance

Onafhankelijke IT audits, security assessments en assurance diensten. SOC 2, ISO 27001, DORA en NIS2 audits, SAP security reviews en control effectiveness testing.

Independent IT audits, security assessments and assurance services. SOC 2, ISO 27001, DORA and NIS2 audits, SAP security reviews and control effectiveness testing.

  • IT general controls (ITGC) audits
  • DORA compliance audits
  • NIS2 readiness assessments
  • SAP security assessments
  • Control design & effectiveness testing
  • Management letter & recommendations
  • Remediation tracking
🤖

AI & Advanced Analytics

AI-powered risk monitoring, anomaly detection, predictive analytics en intelligent automation voor security operations en compliance monitoring. Inclusief EU AI Act compliance advies.

AI-powered risk monitoring, anomaly detection, predictive analytics and intelligent automation for security operations and compliance monitoring. Including EU AI Act compliance advisory.

  • AI-driven risk analytics
  • EU AI Act risk classification & governance
  • Anomaly detection & threat intelligence
  • Power BI & Microsoft Fabric dashboards
  • Automated compliance monitoring
  • Chatbots & intelligent assistants

Interesse in Onze Diensten?

Interested in Our Services?

Laten we bespreken hoe BC uw organisatie kan ondersteunen.

Let's discuss how BC can support your organization.

Plan een Gesprek → Schedule a Meeting →