The organization and its processes define the framework of information security. Often, this framework is not only subject to the actual need for protection in the company. Depending on the sector, regulatory requirements must also be covered.

Information Security Management

Procedures, processes and rules are needed to effectively control and ensure your information security. We offer professional support for the setup, implementation and further development of your ISMS based on ISO/IEC 27001.

We advise and support you in the development and elaboration of IT security strategies and all necessary guidelines and documents.

.

Business Continuity Management and ITSCM

We accompany the entire process, starting with the Business Impact Analysis and the Risk Analysis up to the implementation of the contingency plan. We are your competent partner for all aspects of emergency and crisis management!

What are the initial measures foreseen? Who are the relevant contacts? How do the employees get to alternative workplaces? Rapid availability of answers is essential in an emergency. We bundle the most important information digitally in an emergency app (available for Android and iPhone). With your digital emergency manual, you always have this information at your fingertips!

Whether regulatory or other requirements - today's companies need to maintain their information security in specified quality. At the same time, they have to provide meaningful information about the actual condition. Risks must be systematically identified, required actions must be derived and eventually measures must be implemented. Awareness of actual risks in the company ensures that funds are used sensibly and cost-effectively.