
Processes
Information Security Management | BCM/ITSCM | Governance, Risk and Compliance
“Any type of operating system that I wanted to be able to hack, I basically compromised the source code, copied it over to the university because I didn’t have enough space on my 200 megabyte hard drive.”
— Kevin Mitnick
Information security in the company today is an essential success factor - and at the same time a compelling necessity!
As an independent consulting company, we support our customers in the conception, maintenance and continuous improvement of their IT-based corporate security.
Information Security Management | BCM/ITSCM | Governance, Risk and Compliance
Planning and Design | Analysis and Audits | Penetrationtests
Interims-CSO / CISO on demand | Data Protection | Security Awareness
About us | References & Projects | Contact
Top Secret!