About us

The global digitization has many advantages but also creates a whole new set of risks; data leakage, cybercrime and viruses to name just a few. BSM identifies security risks and IT responsibilities for your company, enabling you to safely use all means of communication technology. We can also trace what went wrong, when it went wrong, how it happened and above all: who can be held responsible! Ultimately, cybercrime is committed by persons; it is our daily job to trace the person(s) responsible for cybercrime so you can recover damages and/or report the crime.

BSM was founded in 2004 by Arnoud Bruinsma as a consultancy agency, specializing in ICT security. Along with a few information security experts, he developed the ICCM® audit a practical method to assess a company’s security status. This methods has since been applied to many companies. In 2007 the quality mark 'data safe' was successfully launched. This mark is issued to companies that have successfully raised their security following the initial audit, bringing information security to an acceptable level. In the same year BSM was licensed by the Dutch Ministry of Justice under POB number 1104, making it possible to conduct private investigations.
By expanding the service portfolio towards investigations we created a unique and effective combination: with our knowledge of and experience with information security issues we are able to quickly and efficiently find and capture digital evidence of cyber criminals. Secondly, by knowing how cybercriminals operate we can advise our customers on the most effective way to counter cybercrime.


No ICT supplier!

BSM is an independent consultancy and investigation company. We do not sell products and we are not connected to a product supplier or manufacturer.


Product delivery

Many of our projects are finalized by means of a report. Following an investigation our reports are often used as legal evidence in court procedure or used to strengthen a dismissal procedure. Reports of our findings during a security audit are used as a blueprint to implement or improve security management.


Tailor made software tools

For many of our activities we have developed our own software and databases. Our security product database consists of most security products with advantages and disadvantages. Finally we have developed a unique search software tool that directly interfaces with many (international) databases and websites, enabling us to find the facts you are looking for quickly, effectively and efficiently.


The customer comes first

All our activities are customized and delivering a quality service is of paramount importance to us. All investigations are unique and each audit differs from the next. Each customer is in another stage of the security risk maturity model (ad-hoc policy within new companies and small businesses to completely policy-driven models for mature companies).