Services
·1 min
Worried about information security?
Another troubling headline about thousands of accounts being hacked?
Are yours among them?
Fortunately, only the large platforms have this problem.
Or do they?
Are you constantly bombarded with new requirements that you had never even heard of until yesterday?
DORA? NIS2? BSI KRITIS Act (Critical Infrastructures)?
Supply Chain Act? Cyber Resilience Act?
Are your customers beating down your doors with “absolutely imperative” certifications, audits or questionnaires?
ISO 27001? ISO 27017? SOC 2? C5? CSA STAR? CC? CIS?
Then let’s talk about solutions that do the heavy lifting for you.
Protection according to BSI IT-Grundschutz
·2 mins
You want to protect your IT. But without a mountain of paperwork. Tailor-made policies and standards already exist.
So you don’t have to reinvent the wheel.
Find out how IT Grundschutz (IT baseline protection) secures your IT.ISMS processes and awareness training
·2 mins
Your policies are on point. But nobody is familiar with them.
The compulsory video training courses to raise awareness have no impact.
Is information security a matter of course for you?
See how ISMS processes can help.Concepts and system architectures
·1 min
The new tool has arrived. The chaos begins. Interfaces? Not a chance. Implementation costs? Surprisingly high.
Do you have a well-thought-out concept and a sustainable architecture?
Find out how to create stable architectures.Structural analysis and system documentation
·1 min
Your IT is up to date. And ready for any changes. Only your expensive team of consultants actually know how the configuration works.
Is your documentation clear and concise?
Find out how transparent structures can make your life easier.Software revision and process automation
·2 mins
The new feature is ready. Suddenly deployment takes twice as long. The critical bug only raises its ugly head to the customer in production.
Sound familiar?
See what revision and automation could do for you.Security by design and structural optimisation
·2 mins
Launch in three days. Just quickly get the go-ahead from the information security team.
The data flows resemble the Okavango Delta. And are only documented in the code. Which looks like pasta.
And now the code review is taking forever?
Find out why security and simplicity are the dream team.Rates
·2 mins
People don’t like to talk about money. And when they do, it’s furtively at the end of a conversation at best.
Is the EU Pay Transparency Directive an issue for you?
Not for me.
These are my terms of engagement.