Portfolio

What we can offer to you
Regardless of whether you would like to obtain an initial overview of the topics of information security management or business continuity management, whether conformity to standards needs to be established or only parts of already existing management systems need to be adapted, we can offer you support at various levels.
We can offer you support within the framework of various norms and standards. Please feel free to contact us.
- ISO / IEC 27001 and others in this family of standards (ISO 27xxx family)
- ISO 22301
- German BSI standards (Standards 200-x)
- German KRITIS and associated industry-specific security standards (B3S)
- NIS-2 directive
- ACS Cyber-Sicherheits-Check
- German CyberRiskCheck according to DIN SPEC 27076
Adaptation of various information security standards to organizations
This also includes migration of a management system to a new revision of a standard or framework. more
Establishment, expansion or revision of an information security managment system
Management systems are “living systems” within an organization and - just like the organization itself - must continually adapt to the circumstances. more
Structural analyzes, protection requirements analyzes, risk analyzes
These analyses are important in order to record the current status and to obtain a level of knowledge on the basis of which changes can be planned. more
Carrying out internal audits or security checks within the defined scope
Checks and audits can also provide an overview of the overall state of information security within an organization and are part of regular information security management in certified organizations. more
Creation, review and addition of information security realted documentation
The documentation associated with information security management must be prepared in accordance with existing requirements and should be reviewed regularly. more
Management consulting at various management levels
Good consulting must include all management levels and be tailored towards the respective target group in order to align information security goals with business goals. more
Employee training and awareness-raising aligned to target groups
Employees form the “human firewall” of an organization and must acquire knowledge and skills in the context of the information security management system. more
Project support in the context of information security
An information security management system describes a set of processes. In order to create this process bundle “from scratch” or to adapt changes to processes, implementation by means of suitable project management is recommended. more