Cyber Security

Resilience Of Your Business Processes Against Cyber Risks

Cyber risks pose a significant threat to companies and organisations. Waves of ransom ware attacks bring business processes or entire companies to a standstill. Data leaks lead to reputational damage and fines. Important know-how is drained by attacks by professionally organised hacker organisations.

Digitisation increases the areas exposed to such attacks. Increasingly heterogeneous system landscapes with hybrid cloud architectures exacerbate the situation almost daily. It is becoming increasingly difficult for companies and organisations to efficiently defend their business processes and data against such attacks.

We help our clients to find the right strategy for their company against these challenges. Here, the focus is on a risk-based method and the integration of a modern Security by Design approach. The early identification of attacks and effective defences are just as important as awareness measures for employees and management.

Success Stories

Automotive Services Provider

IT Security Audit

Preparation for a security check by an automotive group, definition and implementation of physical and IT-related security measures for confidential information, support with auditing
IT Services Provider

External Data Protection Officer

Appointment of an external data protection officer for a data centre operator, survey of all processes involving personal data with a risk analysis and recommendations for the company management, contact person for customers
Automotive Manufacturer


Automated SAP vulnerability analysis of multiple SAP modules, vulnerability report and analysis of the top 10 weak points for the company management, with recommendations on how to reduce risks
Logistics Group

Data Protection Compliance

Group-wide initial survey to identify processes involving personal data and check for compliance with data protection provisions, central monitoring of all processes in the group that deals with personal data
Medical Company

Establishment of an Information Security Area

Definition of areas for which an ISMS was to be set up, analysis of maturity levels, implementation of risk analysis/risk management, implementation of measures, tools, KPIs and documentation
Federal Association

Secure Communication Infrastructure

Planning of an infrastructure for secure communication via Secure Mail (S/MIME infrastructure), coordination of the implementation of an infrastructure for dissemination of association information via mobile end devices
Medical Services Provider

KRITIS Certification

Preparation for KRITIS certification, review of existing processes and documentation, generation of a catalogue of measures, implementation support
Medical Services Provider

Cyber Security Check

Analysis of existing IT security situation, description of areas of activity in order to achieve a higher IT security level (guidelines, training, Best Practice Club, process integration), implementation of measures
Show More
Show less

Core Team