English
English

Cyber Security

Cyber Security

clear, reliable, secure

clear, reliable, secure

Image
Image
VAAL CONSULTING

Cyber security
duidelijk, betrouwbaar & veilig.

- a comprehensive, collaborative system serving your business -

Cyber security

clear, reliable, secure.

- a comprehensive, collaborative system serving your business -

Cyber security
clear, reliable & secure.

- a comprehensive, collaborative system serving your business -

Who is Remco?

Mission
Vision

My mission is to make information security understandable and accessible for businesses. I assist organizations in establishing or enhancing their information security program, with a focus on simplicity and business engagement.

Mission
Vision

My mission is to make information security understandable and accessible for businesses. I assist organizations in establishing or enhancing their information security program, with a focus on simplicity and business engagement.

Mission
Vision

My mission is to make information security understandable and accessible for businesses. I assist organizations in establishing or enhancing their information security program, with a focus on simplicity and business engagement.

My name is Remco Vaal, and since 2022 I have been working as an independent information security consultant.

I assist organizations in organizing security not as isolated initiatives, but as one cohesive whole: clear, practical, and easily explained to both management and engineers. 

What do I do?

The issues in my work mainly involve designing, implementing, or further developing an integrated information security program, or one or more of its core components. This includes matters such as policy & frameworks, governance, risk & compliance, architecture, specific technical measures, and/or their interrelationship. I do not implement products as an engineer, but I work closely with technical teams to ensure that choices are logical, fit into the whole, and are future-proof.

For whom do I work?

Organizations I work for are characterized by the following:

  • there is ambition or necessity to seriously and structurally address information security;

  • there are multiple initiatives and measures, but cohesion is lacking;

  • there is a need for oversight, direction, and leadership (by someone) over the whole;

  • essential processes or specific solutions are (still) missing or insufficiently developed.

That could be a CISO, IT/Security Manager, or IT responsible person thinking: “This needs to be more professional, it can be improved, but where do we start?”

PRINCIPLES

Five Principles for Information Security

Consistent

Similar situations are treated in the same manner.

Consistent

Similar situations are treated in the same manner.

Consistent

Similar situations are treated in the same manner.

Complete

Measures cover the full scope of the environment.

Complete

Measures cover the full scope of the environment.

Complete

Measures cover the full scope of the environment.

Comprehensive

The entire chain and infrastructure are taken into account.

Comprehensive

The entire chain and infrastructure are taken into account.

Comprehensive

The entire chain and infrastructure are taken into account.

Effective

The result is demonstrable and measurable where possible.

Effective

The result is demonstrable and measurable where possible.

Efficient

Security is proportional to the value being protected.

Efficient

Security is proportional to the value being protected.

In de praktijk functioneren security programma's beter wanneer deze vijf pijlers zijn geborgd. Ze vormen het minimale toetskader voor ontwerp, implementatie en continue verbetering.

Logo

© Vaal Consulting 2026. Privacy Policy.

Logo

© Vaal Consulting 2025. Privacy Policy.

Other web pages
Logo

© Vaal Consulting 2025. Privacy Policy.

Other web pages