Portfolio

picture our portfolio

What we can offer to you

Regardless of whether you would like to obtain an initial overview of the topics of information security management or business continuity management, whether conformity to standards needs to be established or only parts of already existing management systems need to be adapted, we can offer you support at various levels.

We can offer you support within the framework of various norms and standards. Please feel free to contact us.

  • ISO / IEC 27001 and others in this family of standards (ISO 27xxx family)
  • ISO 22301
  • German BSI standards (Standards 200-x)
  • German KRITIS and associated industry-specific security standards (B3S)
  • NIS-2 directive
  • ACS Cyber-Sicherheits-Check
  • German CyberRiskCheck according to DIN SPEC 27076

Adaptation of various information security standards to organizations

This also includes migration of a management system to a new revision of a standard or framework. more

Establishment, expansion or revision of an information security managment system

Management systems are “living systems” within an organization and - just like the organization itself - must continually adapt to the circumstances. more

Structural analyzes, protection requirements analyzes, risk analyzes

These analyses are important in order to record the current status and to obtain a level of knowledge on the basis of which changes can be planned. more

Carrying out internal audits or security checks within the defined scope

Checks and audits can also provide an overview of the overall state of information security within an organization and are part of regular information security management in certified organizations. more

Creation, review and addition of information security realted documentation

The documentation associated with information security management must be prepared in accordance with existing requirements and should be reviewed regularly. more

Management consulting at various management levels

Good consulting must include all management levels and be tailored towards the respective target group in order to align information security goals with business goals. more

Employee training and awareness-raising aligned to target groups

Employees form the “human firewall” of an organization and must acquire knowledge and skills in the context of the information security management system. more

Project support in the context of information security

An information security management system describes a set of processes. In order to create this process bundle “from scratch” or to adapt changes to processes, implementation by means of suitable project management is recommended. more