Skip to content

Services

vision from above

adapted and targeted

Services

vision from above

adapted and targeted

Understanding and translating

It all starts with understanding your business and your assets. We listen to you as you define your business objectives and strategies. Our job is to translate these into the disciplines of risk management, cyber security and business continuity. From this, we derive actionable objectives and measures to protect the relevant assets.

Workshop & Impact Assesment

holistic identification of your assets, analysis of your attack surface and survey of your existing security system.

Workshop & Impact Assesment

holistic identification of your assets, analysis of your attack surface and survey of your existing security system.

Management Briefing

Creating awareness of change and updating the situation, orientation and analysis of the risk landscape

Management Briefing

Creating awareness of change and updating the situation, orientation and analysis of the risk landscape

Security Assessment

customised and realistic checks of your attackability and vulnerability to attacks from cyberspace.

Security Assessment

customised and realistic checks of your attackability and vulnerability to attacks from cyberspace.

Planning and implementation

We help you to plan and implement all identified actions. We always work with clear objectives and a structured approach to find the best solutions and most appropriate ways forward. We are open and transparent and believe in mutual trust. We put this above possible short-term interests.

ISMS & BCMS Establishment

Together we create standards-compliant, implementable and customisable systems for small and medium-sized businesses.

ISMS & BCMS Establishment

Together we create standards-compliant, implementable and customisable systems for small and medium-sized businesses.

Training Concept

Quick wins, regular information and sharing, awareness training, lectures on innovative approaches such as games, e-learning and videos.

Training Concept

Quick wins, regular information and sharing, awareness training, lectures on innovative approaches such as games, e-learning and videos.

Security Architecture and Technology Selection

Understanding your requirements and translating them into possible technologies based on current publications and experience

Security Architecture and Technology Selection

Understanding your requirements and translating them into possible technologies based on current publications and experience

Operating and responding

We support or take over the business, or create the necessary skills for your own business.

Competence building

Know-how transfer and set-up, including handover of appropriate solutions and systems.

Competence building

Know-how transfer and set-up, including handover of appropriate solutions and systems.

Emergency and Crisis Management

We help with acute problems and manage emergencies and crises together.

Emergency and Crisis Management

We help with acute problems and manage emergencies and crises together.

Cyber Security Partnership

Partnership, regular meetings and constant access to our expertise.

Cyber Security Partnership

Partnership, regular meetings and constant access to our expertise.