Adobe Stock 79780142


  • Central Government
  • Regional & Local Government
  • Independent Government Bodies (ZBOs)
  • Education
  • Healthcare

20+ years experience in the public sector

We are a GGI Veilig Vendor and selected for multiple framework agreements on central, regional and local level

Partnerships with many universities & high schools

We have partnerships with many universities and high schools. For instance: performing research, providing lectures and traineeships

Accredited for delivering BSPA

We are accredited for delivering BSPA to the Dutch Government as well as assurance audits for DigiD, ENSIA, Suwinet and VIPP

Within the public sector, information security and data protection are crucial. Many organizations in this sector manage large amounts of privacy-sensitive and fraud-sensitive data. These data need to be well-protected from a confidentiality, integrity and availability (CIA) perspective.

To protect public data is not an easy task. The attack surface is wide. Hackers might attack public information systems from various angles, with all kinds of objectives. Cybercriminals force victims to pay ransom or use data to blackmail people. Others may want to simply expose confidential data to the public. Even nation states are active: to influence elections or to frustrate the society in another country or continent. There are many serious threats that public organizations need to defend themselves against.

Honorable work

Secura employees who work on government project usually choose to do so deliberately. A survey among our employees revealed the following motivations:

  • Employees describe their work on behalf of the government as socially relevant, because it impacts the safety of the Netherlands as a whole, rather than individual companies
  • Employees feel proud to work on government projects for the – they also use the word 'honorable'
  • Working on government projects is more challenging, because there are more customized systems involved.

One of Secura's pentesters put it this way: 'I'd rather prevent a state actor from flooding a part of the Netherlands or stealing thousands of people's identities than maintaining a company's reputation.' Her colleague added, 'The variety in work is huge: from trash bin sensors to supercomputers.' And: 'The fact that a document can be made public via the Freedom of Information Act makes the work extra challenging. It requires a good understanding of the administrative and social context in which our customers operate.'

How to secure the public sector?

Adobe Stock 119150241


Security is a matter of People, Process and Technology. Recent large cases of phishing and social engineering are proof that even established organizations are still vulnerable to a weak human factor. Organizations with Chief Information Security Officers (CISOs) and Data Protection Officers (DPOs) in charge of security, must face the reality that the human factor needs continuous attention. Employees have access to important data, exchange important files, and they might even have the knowledge and be aware of security aspects. However, to get them to behave accordingly requires a comprehensive security awareness & behavioral program.

Adobe Stock 180950871


From a process perspective, an Information Security Management System (ISMS) is required by regulation. Most of these are based on processes and controls as defined in ISO 27001. The Dutch government uses the ‘Baseline Informatiebeveiliging Overheid’ (BIO), schools and universities rely on SURF guidelines and Dutch healthcare providers use NEN 7510 as a baseline for information security. It is important to have these systems in place and act accordingly. Especially when it comes to dealing with sensitive public data, annual assurance assessments are required for DigiD / ENSIA / Suwinet / VIPP / NVZ / NEN 7510. As well as up-to-date privacy/GDPR/DPIA agreements.



When it comes to technology, public organizations use a wide variety of systems and technologies. Ranging from old legacy systems, applications and infrastructure to software hosted by a cloud service provider and mobile apps, each of these can contain undiscovered vulnerabilities that require to be (pen)tested. Our Red Team thoroughly assesses security in both information technology and operational technology (to manage buildings, bridges and traffic) environments. Even with SIEM/SOCs in place, these systems can’t be blindly trusted. For public welfare, it is important that these systems are continually tested and monitored.

Local government, education & healthcare organizations

Would you like to learn more about our cybersecuricty services for local government, education or healthcare organizations?

Email Hans keyboard_arrow_right
Hans Labruyere Senior Account Manager call +31 (0) 88 888 31 00

Governments, Education, Healthcare Organizations

Would you like to learn more about our cybersecuricty services for government, education or healthcare organizations?

Email Ruud keyboard_arrow_right
Ruud Borst Senior Accountmanager Public call +31 (0) 88 888 31 00

Central government, ZBO’s and large municipalities

Would you like to learn more about our cybersecurity services for central government, ZBO’s and large municipalities?

Email Christoffel keyboard_arrow_right
Christoffel Klimbie Senior Account Manager call +31 (0) 88 888 31 00