Security Management, Processes & Human Factor

Security Assessments

Get to the bottom of cybersecurity - for a strong foundation and effective processes.

We can help you to gain an overview and identify where you need to take action. Our experts understand the challenges of implementing standards, how to align risk management with business processes, and how to conduct a detailed review of your organization’s processes across multiple locations.

Our approach:   

  1. To initially assess the information security posture in your organization, we discuss how IT and information security is organized in your organization and develop a baseline with you. This will be used to assess the level of security across all locations and to clarify how the requirements should be implemented organization-wide. We take a holistic view of your security, such as employee awareness, supply chain, physical security, IT operations, risk management processes and other requirements of the international ISO 27001 standard.
  2. To gain an initial overview, we create a questionnaire with pre-defined response options based on the previously developed baseline according to a maturity model. The analysis of this information provides an initial picture of IT security management. Many problems or misunderstandings can only be uncovered through discussion, which is why we interview responsible personnel at the various locations. This allows us to find out which areas are compliant, where support is needed and where urgent action is required. 
  1. Accompanying the information security and IT security management survey, we analyze your organization’s sites from a technical perspective to determine whether the requirements regarding IT security are met. We especially focus on neglected or invisible IT systems that are not sufficiently documented. Such outdated hardware and software are often a gateway for cyber attacks.
  2. We then summarize the results of our surveys in a report with a heat map (maturity model) of your company’s posture. We consolidate these findings into a list of prioritized recommendations for short, medium and long-term action plans. 

Do you want a new, sharpened overview of cybersecurity in your company?

Contact us for an initial consultation!

MORE INFORMATION?

Contact us for more information about our products and services.

book now