Information security

You want to review whether your company-wide risk management considers business critical information appropriately, completely and effectively. You want to examine whether the implemented safeguards balance the confidentiality, integrity and availability of information according to the requirements of your business. You want to know whether information security is rooted in your business processes and in your employees' minds appropriately, completely and effectively. You want to review whether your procedures to detect and treat security events and incidents as well as to monitor, review and improve information security are appropriate, complete and effective.

Our offer

  • Examine the information security policy or deduce it from the business objectives
  • Review or improve the identification, analysis, evaluation and treatment of information security risks
  • Examine the availability of information and the information flux in the business processes
  • Review or improve the rooting of information security safeguards in the business processes
  • Review or improve the procedures to measure the effectiveness of security measures
  • Assess the information security awareness of personnel
  • Review or improve the management of and the responsibilities for information security
  • Review or improve the procedures to detect security events and to react to security incidents, including reporting
  • Review or improve monitoring and reviewing procedures to recognize process errors, security violations and incidents as well as organizational and technical problems
  • Review or improve technical and physical safeguards
  • Review or improve the quality and control of documents and records
  • Prepare and coach the ISO/IEC 27001 certification