ISMS – Information Security Management System

Establish an effective ISMS that forms the basis for securing the future of your company.

We analyse and optimise all processes to ensure the availability, confidentiality and integrity of your company's assets. Our experts identify risks, continuously improve your protective measures and ensure that you are always one step ahead of threats. If required, we can also provide you with an experienced information security officer (ISO) to professionally manage your ISMS.

Rely on our expertise and build on a secure foundation for your company.

These customers already trust us

That's what it's all about

Companies and organizations process large amounts of sensitive information: This includes personal data of customers and employees, financial data, annual reports, strategy papers or even secret product innovations.

An ISMS helps to protect all this data - from unauthorized access, theft, manipulation or espionage.

Work with us to ensure the confidentiality, integrity and availability of your information while minimising the risk of security incidents.
Our experts will help you set up an ISMS and also support you in implementing ISO certifications, e.g. ISO 27001.

Test areas of our audits

Evaluation of current information security with regard to the three most important protection goals:

Confidentiality

Ensure clear guidelines: Who is authorized to access sensitive data and how?

Integrity

Protection against unauthorised manipulation, theft or deletion of information.

Availability

Information and systems must be available to authorized persons at all times.

Good reasons to entrust us with your ISMS

  • Expertise and experience: Our experts have extensive experience in information security management. Choose between legal advice or book you external ISO (information security officer).
  • Efficiency and time savings: Save time and resources for training and implementation - we organize the process efficiently and quickly.
  • Independent assessment: We offer an unbiased assessment of your security measures as we are not involved in the day-to-day business.
  • Up-to-dateness and compliance: With us, your ISMS remains up-to-date and meets the latest standards and all compliance requirements.
  • Continuous support: We offer long-term support with regular audits, training and advice.

Cyberattacke! And now?

If a cyber-attack occurs, action must be taken quickly and efficiently. We are at your side, analyze the incident, initiate countermeasures and help to quickly resume normal operations to prevent major damage.

  • Rapid response: Our team is at your side in the event of IT security incidents.
  • Analysis & expertise: Together we solve the incident with specialist knowledge and experience.
  • Documentation & recommendation: We document the incident, and you receive our recommendation for action with specific implementation measures.
  • Prevention & protection: Prevent recurrences with our customized security solutions.

Our offer

Would you like an external information security officer, in addition to legal advice, who is responsible for ensuring information security and your ISMS?

We support your company in setting up your ISMS and prepare you optimally for TISAX® assessments and ISO 27001 certification.

External Information Security Officer (ISO)

Advice and support in setting up an ISMS

Introduction and implementation of elementary ISMS processes

Creation of company-specific security guidelines

Clear specification of the roles and rights of the ISMS scope of application

Actual recording of the three most important protection goals of the information security standard

Risk assessment and introduction of a risk management system

Continuous monitoring and improvement process

Planning and implementation of regular audits

Documentation of all risks and incidents

Support and preparation for ISO 27001 or TISAX®

Employee training

NIS2 compliance with ISO 27001

An ISMS that complies with ISO 27001 provides the perfect basis for meeting the NIS2 requirements. This is because the two directives go hand in hand. This international standard systematises the planning, implementation, monitoring and improvement of information security in companies. Find out how you can implement the new EU directive to strengthen cyber security (NIS2). With an ISMS, you have already fulfilled a significant part of the NIS2 requirements.

Certifications

We are the right partner for your certification. As experienced ISMS consultants, we know our way around and know what is important. We support you in developing a suitable strategy and accompany you all the way to certification. In doing so, we rely on ISO 27001 and TISAX®.

Analysis

We work with you to develop a security concept tailored to your needs. Internal audits are used to identify weaknesses that have become apparent during the analysis of the framework conditions and risk management.

Concept

We specify IT security measures and create implementation concepts with short, medium and long-term steps for holistic security realization. Organizational, infrastructural, personnel and technical aspects are taken into account.

Roll-out

We work closely with you to implement IT security measures based on our extensive experience and expertise.

Monitoring

The implementation of the IT security concept is followed by continuous monitoring in order to maintain and improve the security level. This is done by regularly monitoring the measures using defined key performance indicators (KPIs).

Talk to our experts.

We will be happy to advise you and look forward to your questions.

HEAD OF COMPLIANCE

Markus Vatter