Increasing demands on information security require a methodical approach to managing the risks involved. The quality of risk management determines the effectiveness and efficiency of the Information Security Management System (ISMS). We work with you to develop the relevant processes and controls and prepare you for an audit.
Cyber-attacks can be triggered by phishing, hacking, data breaches and data loss. Previous protective measures are no longer sufficient. We develop suitable concepts with you to achieve an appropriate level of cyber security.
The term resilience is derived from the Latin “resilire” (for to bounce back or rebound). Originally, it meant the physical ability of a body to bounce back to its original form after changing shape. Resilience applied to the company means that it should build up and train various measures to survive crises. We support you before the crisis, but also in a crisis.
Cloud-Security and Compliance (BSI, CSA, ESMA)
Control systems serve process security. Risks are transparent and controlled by the ICS. New challenges arise with cloud applications. The BSI has issued a current standard – Cloud Criteria C5. We guide you through implementation and testing. We support you in establishing cloud security according to the specifications of the relevant cloud security standards as well as securing compliance.
Cyber-Security / SIEM / SOC
Cyber-attacks can be triggered by phishing, hacking, data breaches and data loss. Previous protective measures are no longer sufficient. We develop suitable concepts with you to achieve an appropriate level of cyber security. This also includes the establishment of a Security Incident and Event Management (SIEM) as well as a Security Operations Centre (SOC).
Cyber-Insurance Readiness
Cyber-attacks can be triggered by phishing, hacking, data breaches and data loss. Prevention is done by raising awareness and training employees. The most frequent gateway for cyberattacks is and remains the human being. We establish protective measures with you and prepare you for cyber-insurance.
IT-Security
Increasing demands on information security require a methodical approach to managing the risks involved. The quality of a risk management system determines the effectiveness and efficiency of the Information Security Management System (ISMS). We work with you to develop the relevant processes and controls and prepare you for an audit.
Penetration Test
A penetration test is the proactive security measure in the form of a simulated attack on your IT system to uncover vulnerabilities and recommend measures to eliminate them.
Based on your requirements and the purpose, we perform the penetration test within your IT system, from outside or combined.
Basically, we test the following: – Determining the maturity level of existing security devices, networks (internal/external), applications, mobile devices, employees, physical security devices.