Our Expertise in Cybersecurity

CSC – IT Center for Science
CSC offers secure solutions for handling sensitive data in research.
Use cases
Secure processing of sensitive datasets in research contexts.

Finnish Meteorological Institute
FMI invests in the cybersecurity of its systems and data, protecting critical infrastructure.
Use cases
Securing forecasting systems against cyber threats; ISO 27001 certification in progress; implementation of NIS2 directive.

Geological Survey of Finland
GTK's services and materials are protected by firewalls and are backed up regularly. Network traffic is constantly monitored. The materials have a security classification.
Use cases
GTK regularly reviews its information security, and network traffic is monitored. The security classification of materials is regularly negotiated with, among others, the Ministry and the Ministry of Information and Communications Technology. Materials with the highest security classification are only available to a limited group.

Gispo
Consultation on secure and responsible use of geospatial data, including risk management for combining sensitive and public datasets. Gispo provides insights into best practices, data classification, and ensuring compliant data sharing in municipal and national contexts.
Use cases
Gispo has supported public sector clients by assessing risks and defining safe practices for publishing and combining critical geospatial datasets, such as infrastructure or location-sensitive information.

Intellisys
Intellisys is supporting cybersecurity awareness by tools and know-how on internet domain management and service provision. Intellisys is an asset for the clients in deep understanding of internet services and has means to sercure and attain necessary domains, for the company.
Use cases
The company has successfully claimed the ownership of internet domains for its clients from malicious registrants and built solid plans for securing the freedom to operate in the internet.

Oulu University of Applied Sciences
Oamk develops cybersecurity expertise, particularly in information and communication technology training, where students learn software security, network protection, and cyber threat mitigation. Additionally, Oamk emphasizes data protection and security in all activities, such as handling personal data, where the responsibility of students and staff is highlighted in protecting user IDs and passwords. In RDI activities, cybersecurity expertise is evident in projects like the development of digital innovations (Arctic Drone Labs), ensuring the secure handling and transfer of drone data.
Use cases
Improving cybersecurity for companies and organisations through training and testing.
Oamk integrates cybersecurity in education and daily practices, including secure software development and network protection.
Students and staff learn careful handling of personal data and responsible management of user IDs and passwords.
RDI activities focus on designing and implementing secure digital solutions, reinforcing practical cybersecurity skills.

Sitowise
Sitowise combines engineering, design, and digital expertise to offer comprehensive cybersecurity services.
Use cases
ISO 27001-certified information security management.
Consulting on cyber maturity (e.g., Traficom’s cyber meter), training, continuity planning, and regulatory compliance (NIS2, CER, CRA).
Recovery exercises (e.g., XAMK and Traficom’s Verkkotietopiste 2023).

Spatineo
Spatineo offers security audits and penetration testing for geospatial services to identify vulnerabilities and improve robustness. Includes user and usage analytics for data providers and users.
Use cases
Regular security audits, penetration testing, threat modeling, and detection of reconnaissance targeting critical infrastructure.

Ubigu
Ubigu’s experts have long-standing experience in cybersecurity aspects of geospatial systems and data management. Ubigu offers services for developing secure geospatial infrastructures.
Use cases
Assessing and eliminating vulnerabilities in data infrastructure, evaluating risks in data source usage, implementing zero trust policies.