NANO IT Gouv. – Disaster Recovery Plan

Business Continuity Management/ Disaster Recovery Plan

Business Continuity Management (or a Disaster Recovery Plan) is a set of frameworks governing the operation of the business management requirements and regulatory processes. In case of an emergency, an organization is able to respond quickly to ensure that critical business functions continue without disruption.

Organizations are highly dependent on the Internet and networking; thus, traditional backup and recovery plans can no longer guarantee continuity of business operations. A business continuity plan is created based on business processes, thereby helping an organization to establish a more coordinated safety management system. Business continuity plans help organizations deal with risk and adjust automatically to ensure continuous business operation. Below are the three elements of Business Continuity Management:

Continuity Management/ Disaster Recovery Plan

01. High Availability
High availability refers to the ability to provide local fault in the case of emergency. Users are able to access the application regardless of whether the fault was in the business process, physical facilities, or because of IT hardware and software failure.

02. Continuous Operation
This refers to the ability to assure business operations run continuously without any failure. Users do not need to abort running applications or business processes because of the ongoing normal backup or maintenance.

03. Disaster Recovery
This refers to the recovery of data in different locations in the event of disaster at a single location.

Nano IT Security’s Approach

  1. Project Initiation
    To establish a common understanding of the project’s objectives.
  2. Risk assessment
    Analyze potential risks such man-made disasters (fires and terrorist attacks), natural disasters (floods and earthquakes), communication failure, or system errors. A disaster recovery plan is created according to the presence or absence of potential risks.
  3. Business Impact Analysis
    Business impact analysis is essential for critical business functions. This involves the analysis of the possible loss and negative impact to an organization in the event of a disaster.
  4. Recovery Strategies development:
    Identify the recovery strategies for the critical processes
  5. Business Continuity Plan development:
    Document the business continuity plans
  6. Business Continuity Plan testing

Website Security Health Check – Nano IT WEB SECURITY-CHECK SCAN

Website Security Health Check

There are over 1 billion websites on the world wide web todayWebsite Security health check. This milestone was first reached in September of 2014, as confirmed by NetCraft in its October 2014 Web Server Survey and first estimated and announced by Internet Live Stats (see the tweet from the inventor of the World Wide Web, Tim Berners-Lee).

Another statistic is that Google quarantines approximately 10,000 websites a day via its Safe Browsing technology, which means that about 1% of the total websites online are hacked or infected.  With this sort of impact, it’s natural to ask the question how websites keep getting hacked.

Websites get hacked because of three things:

  • Access Control
  • Software Vulnerabilities
  • Third-Party Integrations

To protect your website, Nano IT Security offers the Website Security Health Check service, focusing on typical security vulnerabilities. This service is a combination of both our External Penetration Testing and our Web Application Penetration Test services.

Website Security Health Check methodology includes:

  • Input validation attacks
  • Cross site scripting attacks
  • Script injection attacks (SQL injection)
  • CGI Vulnerabilities
  • Cookie Theft
  • User privilege elevation
  • Web/Application server insecurity
  • 3rd party software vulnerabilities
  • Database vulnerabilities
  • Privacy exposures

Contact us to check the security of your website now

Why it is important to secure your website ?

Well, to answer this question we must ask another one: is your website important for your business ?

If the answer is “YES”, because your website deliver important data information, or serves as a selling point of your services/products, than it’s necessary that your website be well protected. Of course, there are also other reasons we can talk about like business image to your customers, prospects and business partners that can be damaged if your website is down after a hacking attack.

If you want the flexibility to schedule site integrity checks, we can do it! Schedule scans of your websites to ensure you’re minimizing your security risks. You can also filter specific items on your site that change often, the power is yours.

Website Malware Monitoring

Be at ease knowing you have Nano IT Security monitoring your site. We can identify if your site has been hit with the latest malware attack and alert you to take action. Receive alerts anytime when anything changes via Email.

Check your website security now

Download, fill in and send us your “Nano IT WEB SECURITY-CHECK SCAN Order “and we will  contact you back in less than 6 hours after receiving it by email.

Nano IT Security offers also Website Security for Agencies and Developers

Nano IT Security Portugal

IT Security Services

IT Security ServicesNano IT Security is a company that specializes in Information Security and has been improving its use of security techniques and methodologies with certified professionals to ensure the success of its clients’ projects. The method and organization of work are customized to ensure satisfaction, quality of services and expected results. Nano IT Security Services goal is to support our customers in the practice of security executive analysis, pentesting, system integration and data migration, managing and reducing the risk and potential impact of different threats that the use of computer network pose to their business.

We have specialized services in various areas of information security, guaranteeing complete assistance to your company, effective risk management of the organization, coupled with the proper management of information security controls.

Information Security Management is a continuous process, and in its cycle there are different activities that must be ensured in order to sustain a uniform security management strategy. In addition to the implementation of appropriate management processes, our specialists are equipped to technologically test the infrastructures and their applications in order to identify in a timely manner and correct any vulnerabilities in the customer infrastructures that may represent a risk to the Confidentiality, Integrity or Availability of information.

Another of the axes of IT Security  Services is the professional level of people who share professional information. Therefore where Nano IT Security carries out awareness actions regarding Information Security and inherent risks.

You want to improve or test your Information Security level ?

Contact us and benefit from our IT Security Services.

Information Security Governance Risk & Compliance Advisor

Start Date – ASAP
Duration – 6 months (renewable)
Location – Brussels
Function Description: As an Information Security Advisor you will carry on the activities listed below:
Perform Legal & Regulatory Watch.
  • Ensure that all Information Security related authoritative sources are captured.
  • Perform gap analysis to ensure that missing elements are integrated when & where relevant in the Information Security Policies by proposing the necessary change requests text.
  • In collaboration with Legal determine the applicability of the source to the bank.
  • Maintain a traceable inventory.
Ensure appropriate Statement Of Applicability
Based on a good knowledge of the bank normative framework that you will need to acquire, and particularly, onyour own experience:
  • Identify affected assets and processes upon policy changes;
  • Attribute implementation responsibilities;
  • Get implementers’ acceptance on the attributed implementation responsibilities;
Maintain a traceable inventory the alignment between Technical Standards (e.g. Windows, Mainframe, Network, other IT activities) and the Information Security Policies :
  • You will be the BNP Paribas Fortis Global Security SPOC for IT stakeholders in Belgium and France.
  • You will analyse the IT technical standards and perform a mapping to BNPPF policy framework.
  • Traceability being key, you will keep track of deviations and use your influence skills to convince stakeholders for a pragmatic resolution.
  • You will report on the compliance status between policies and technical standards to Global Security, IT and Senior Management.
Execute security risk assessments in IT and business, scoping projects or legacy assets (applications, business solutions, 3rd-parties organization, processes …). Maintenance of identified risks in the risk registry database.
Education: University degree in IT or science or an engineering degree, with a strong IT background or proven equivalent experience / skills in the area.
Certification: Certifications in ISO27k series, Information Systems Security Professional CISSP, CISA; …is preferable
Languages: French Fluent speaking and writing (mandatory), Dutch Good speaking and writing, English Fluent speaking and writing (mandatory)
Experience: 3-5 years of experience in Information Security and in IT process management.
Mandatory Technical Experience:
  • 2-5 year experience in IT security technology and processes (secure networking, web infrastructure, Wintel, UNIX, Mainframe, ATM, etc.);
  • Metrics definition and dashboards.
  • Significant experience in operational/security risk management.
Preferable: Certifications in ISO27k series, Information Systems Security Professional CISSP, CISA; ..
Mandatory Functional Experience:
  • 2 years’ experience in developing and maintaining policies and / or processes (preferably in IT area).
  • Experienced with regulatory requirements, ISO/IEC standards (eg:27001 Information Security Management Standard,…), laws and regulations
  • Hand-on experience in the performance of security risk assessments on Third-parties and applications.
  • Knowledge of Information Security and Risk Management frameworks
  • Tools: advanced knowledge and use of Office suite, SharePoint,…
  • Coordination of / collaboration with externals resources.


  • Certified ISO27001 Lead Implementer.
  • Experience in designing and implementing controls.
  • Knowledge of GRC Tools such as RSA Archer eGRC Suite.
  • Working experience with colleagues of BNPP Group (Paris) & ready to travel on ad hoc basis.
  • Project Management /coordination skills (Ability to run projects averaging 100-150 days mostly intra-team).
Business Experience:
  • 2-5 years’ experience in IT, Information Security environments.
  • Capability to quickly understand end-to-end process flows and control needs.
  • Experience in creating memos to the attention of senior management level.
  • If possible, preference will be given to candidate that have a good knowledge / practical experience of different bank entities / processes if possible.
Soft skills
  • Quick self-starter, pro-active attitude, team player.
  • Excellent English writing skills.
  • Good Communication and influencing skills; ability to capture and adapt to stakeholder expectations.
  • Good analytical and synthesis skills; ability to produce structured and concise documents
  • Autonomy, commitment and perseverance in personal organization..
  • Ability to work in a dynamic and multi-cultural environment.
  • Results-oriented; high performer.

If you think that your profile fits to these requirements, please send us your CV by email at, with the job title as reference in your email subject; or send it online.