Our concept: Two-step information security.

WE ARE HERE FOR YOU. FOR YOUR SECURITY.

1.

Operation & Development

Information Security Management System

Standardization.
Opportunities.

THE BUILDING BLOCKS FOR THE INTRODUCTION OF YOUR ISMS

Based on international standards, and together with you, we will implement an ISMS that reflects your specific demands.

Gap Analysis

The GAP Analysis is meant to be used for checking the current status of your processes and taking the results to generate an action plan before the introduction of your ISMS in compliance with ISO/IEC 27001. This aims to identify measures and documentation gaps, and to prioritize actions for the implementation of your ISMS.

Scope

Stakeholders and interested parties including their requirements will be determined in internal as well as external context of your business within the framework of requirements management. The results can be used to establish the planned scope of application for the certification of your ISMS.

Processes and Guidelines

Drawing up and adapting required and supported processes are indispensable components for the introduction of an effective ISMS (in compliance with ISO/IEC 27001). Your business processes form the basis and will be configured in compliance with standards by being properly adapted and enhanced.

Internal Audit

An internal audit will assess if your ISMS complies with the requirements of ISO/IEC 27001. We will first check the documentation of your ISMS, followed by its implementation and its efficiency in practice. You can use the results for the management review of your ISMS.

Trainings

Your employees have to know what they need to do in order to ensure data protection. We will conduct awareness trainings at your company to accomplish that, and our partner qSkills will provide general trainings (ISO/IEC 27001: Internal Auditor, Lead Auditor as well as Implementation).

Certification

When the introduction of your Information Security Management System is completed it might need to be certified, to officially verify the information security that it has gone through. This demonstrates to your customers and the authorities (e.g. BSI “Federal Office for Information Security”) that you are certified. We will prepare you for this appointment in the best possible manner.

You need a Management System?
We´ll answer any question you might have.

2.

Operation and Development

Information Security Management System

Standardization.
Opportunities.

ISMS [as a] Service

We accompany you in the operation and the continuous development of your information security management system in a long-term.

Business Impact Analysis

This service package supports you in assessing dependencies and possible weak points in your business model. That includes for instance conducting a BIA in order to analyze your business processes within the scope of your ISMS, or assessing the security requirements of your information values.

ISMS Policy

This service package supports the effective controlling of your Information Security Management System (ISMS). That entails, for example, checking the strategic targets in terms of your information security policies and deriving quantifiable operational objectives.

Technical Implementation

We use this service package to support you in the technical implementation of policy objectives from Annex A (normative appendix) of ISO/IEC 27001. That includes, for instance, the description or improvement of your existing patch management processes.

Information Security in Case of Need

We use this service package to support you in your emergency management. That includes, for example, checking your emergency action plans or the simulation of contingency options in order to ensure your information is protected even in case of an emergency.

Kontext der Organisation

Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam.

Leitlinie Informationssicherheit

Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam. voluptua. At vero eos et accusam et justo duo dolores et ea rebum.

Sensibilisierung

Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam. voluptua. At vero eos et accusam et justo duo dolores et ea rebum.

Kontext der Organisation

Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam.

Leitlinie Informationssicherheit

Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam. voluptua. At vero eos et accusam et justo duo dolores et ea rebum.

Sensibilisierung

Lorem ipsum dolor sit amet, consetetur sadipscing elitr, sed diam nonumy eirmod tempor invidunt ut labore et dolore magna aliquyam erat, sed diam. voluptua. At vero eos et accusam et justo duo dolores et ea rebum.

You want to enhance your management system?
We'll answer any questions you might have.

CASE STUDY FOR ISMS FROM OUR DAY-TO-DAY ROUTINE

How do you protect your know-how?
  • Regulate the handling of  information for different situations (at the office, teleworking at home, on the go)
  • Raise your staff´s awareness
  • Support them with necessary equipment

Imagine one of your employees working with her laptop when traveling on the train. It would not be all too hard for other passengers to look at sensitive information on the monitor and simply read along. You must not underestimate the risk of such situation, which can lead to one of your competitors accessing your company’s valuable know-how. And this is merely one of the many cases demonstrating how important it is to have your information protected in everyday situations.

Whether you are on a train, at the airport, or in a café, you need to remain aware of possible risks in terms of information confidentiality; and this awareness should not cease at your company’s turnstile.

Our strategically suitable service:
ISMS – The Information Security Management System

ISMS
Information Security
Management System

WE ARE HERE FOR YOU.

FOR YOUR SECURITY.

Write us a message!

We are happy to hear from you
  • You wish a recall?

Thank you very much.

Your message was successfully transmitted.
We will get in touch with you immediately.