Secure and compliant: A suitable security strategy for you

We support you in defining, implementing and monitoring your security policy and strategy. In addition, we offer you support in the creation of the associated concept and architecture. Benefit from our tools in the form of methods and templates. In cooperation with you, we develop a management system that serves your strategy and is compliant in the long term.

Selected references on the subject

Our Services

  • Strategy

    Together with your key staff, we develop a suitable cyber, information security and data protection strategy.

    • Targeted strategy adapted to your business processes
    • Definition of principles and objectives
    • Governance instruments
    • Performance indicators and benchmarking
    • Action plans and a roadmap

  • Policies and Requirements

    Ensure conformity with higher-level specifications. We support you in developing or renewing internal directives, policies and guidelines and in implementing technical guidelines such as system hardening.

  • Security Concept

    Would you like to define security targets and measures for your project or your company? We develop a suitable security concept in cooperation with you. In this process, we are guided by ISO/IEC 2700x (or other standards upon request) and are consequently also compatible with project management methods such as HERMES or PRINCE2. The safety concept includes the following aspects in particular:

    • Description of the object of protection
    • Assessment of the security needs
    • Analysis of potential threat and damage scenarios (threat modelling)
    • Assessment of the likelihood of occurrence and the extent of damage (risk analysis)
    • Developing security requirements and appropriate measures
    • Identification of any residual risks
  • Information Security Management System

    To meet and maintain your level of security and compliance, a systematic approach is helpful to indispensable. We support you in setting up and optimising a suitable information security management system (as well as data protection and data security management system). Benefit from deploying our specialists who have certification as ISO27001 lead auditors and also practical experience in a variety of companies and industries. We support you with the following topics: