Services
vision from above
adapted and targeted
Understanding and translating
It all starts with understanding your business and your assets. We listen to you as you define your business objectives and strategies. Our job is to translate these into the disciplines of risk management, cyber security and business continuity. From this, we derive actionable objectives and measures to protect the relevant assets.
Workshop & Impact Assesment
holistic identification of your assets, analysis of your attack surface and survey of your existing security system.
Workshop & Impact Assesment
holistic identification of your assets, analysis of your attack surface and survey of your existing security system.
Management Briefing
Creating awareness of change and updating the situation, orientation and analysis of the risk landscape
Management Briefing
Creating awareness of change and updating the situation, orientation and analysis of the risk landscape
Security Assessment
customised and realistic checks of your attackability and vulnerability to attacks from cyberspace.
Security Assessment
customised and realistic checks of your attackability and vulnerability to attacks from cyberspace.
Planning and implementation
We help you to plan and implement all identified actions. We always work with clear objectives and a structured approach to find the best solutions and most appropriate ways forward. We are open and transparent and believe in mutual trust. We put this above possible short-term interests.
ISMS & BCMS Establishment
Together we create standards-compliant, implementable and customisable systems for small and medium-sized businesses.
ISMS & BCMS Establishment
Together we create standards-compliant, implementable and customisable systems for small and medium-sized businesses.
Training Concept
Quick wins, regular information and sharing, awareness training, lectures on innovative approaches such as games, e-learning and videos.
Training Concept
Quick wins, regular information and sharing, awareness training, lectures on innovative approaches such as games, e-learning and videos.
Security Architecture and Technology Selection
Understanding your requirements and translating them into possible technologies based on current publications and experience
Security Architecture and Technology Selection
Understanding your requirements and translating them into possible technologies based on current publications and experience
Operating and responding
We support or take over the business, or create the necessary skills for your own business.
Competence building
Know-how transfer and set-up, including handover of appropriate solutions and systems.
Competence building
Know-how transfer and set-up, including handover of appropriate solutions and systems.
Emergency and Crisis Management
We help with acute problems and manage emergencies and crises together.
Emergency and Crisis Management
We help with acute problems and manage emergencies and crises together.
Cyber Security Partnership
Partnership, regular meetings and constant access to our expertise.
Cyber Security Partnership
Partnership, regular meetings and constant access to our expertise.