Development and maintenance of information security management systems (ISMS)

With us to a practiced ISMS according to the state of the art

Cyber security check according to DIN SPEC 27076 for SMEs

  • Security analysis: We check your IT infrastructure for vulnerabilities and security gaps in an approx. 2-hour interview. We use the software provided by the German Federal Office for Information Security (BSI) for this purpose.
  • Risk assessment: Identification and assessment of potential risks to your systems and data.
  • Customized recommendations: Specific recommendations for action to improve your IT security.
  • Reporting: Detailed documentation of the results and proposed measures.

Information security in accordance with ISO 27001 and BSI Standards 200-1/2/3

  • Comprehensive security analysis
  • Risk assessment: Identification and evaluation of potential risks to your systems and data.
  • Customized recommendations: Specific recommendations for action to improve your IT security.
  • Measures to protect against cyberattacks: Detecting and fixing vulnerabilities before they can be exploited.
  • Optimal compliance: Ensuring compliance with legal and industry-specific security requirements.
  • Increased trust: Strengthening the trust of your customers and partners through demonstrably high security standards.
  • Continuous improvement: Regular audits help to continuously improve and adapt your security measures.
  • Preparation for certification

External information security officer ISOplus DEKRA

  • Creation and implementation of security guidelines: Supporting management in the creation of security guidelines and coordinating the creation of security concepts and associated guidelines.
  • Risk management: Identification of security gaps and risks, classification according to severity and initiation of suitable security measures.
  • Sensitization and training: Initiation and coordination of awareness-raising and training measures on information security.
  • Reporting: Regular reporting to management and other security officers on the status of information security.
  • Investigation of security incidents: Investigating security-related incidents and coordinating incident response.
  • Project coordination: Coordination of security-related projects and support with the introduction and further development of the information security management system (ISMS).