As business processes become increasingly digitalized, the risk of cyber attacks is growing. We apply state-of-the-art methods to identify the key priorities at the right time – to make sure you benefit from cyber security.
- Analysing the threat situation
- Understanding the motives for cyber attacks
- Involving the board of directors and management
- Identifying cyber security maturity
- Reviewing alternative solutions
- Deriving urgent measures
- Drawing up an investment plan for cyber security
- Responding immediately to security incidents
Analysing the threat situation
We systematically identify your company’s risks and weak points, not only within the context of your own business, but also as part of an industry or sector. We make sure that your board of directors and management benefit from a consistent picture of the current cyber security situation. This equips them with a reliable basis to take decisions on suitable action.
Understanding the motives for cyber attacks
We draw up initial analyses of the motives for various groups of cyber attackers that could damage your business. The focus here is on protecting the key elements of your company, taking account of your own vulnerabilities.
Involving the board of directors and management
We involve the board of directors and the management, and prepare them for their responsibilities in the event of a cyber attack. Training programmes tailored to the level of the participants ensure that they understand the threats facing the company from cyber attacks.
Identifying cyber security maturity
We check the maturity level of cyber security in your company, based on standards that already exist such as NIST (National Institute of Standards and Technology) or CIS (Center for Internet Security). We work together to develop your target maturity, the cyber security programmes needed to achieve it, and the necessary resources.
Reviewing alternative solutions
We analyse all your options for a solution in case of a cyber security incident. For this purpose, we prepare Incident Response Plans together with runbooks for them, and we define the response to security incidents.
Deriving urgent measures
We develop detailed security measures that will prevent significant damage to the company’s key elements in case of cyber attacks.
Drawing up an investment plan for cyber security
We establish financial transparency and ensure the controllability of all planned cyber security measures, so as to enhance security and prevent any impact on business processes.
Responding immediately to security incidents
By developing all the necessary elements of Incident Management, we ensure that a process for rapid troubleshooting is in place. Specifically, this includes drawing up the Incident Response Plan and producing the accompanying Incident Response runbooks. We make sure that the appropriate concept is in place for the Incident Response Organisation (7 x 24 or 5 x 10), and we test it with simulation procedures such as Tabletop or Red Team exercises.