Our services
Cyber attacks have now become everyday occurrences. Threat situations change constantly, but our services and our experts ensure that your cyber security is comprehensively guaranteed.
- Protecting industrial installations (OT/ICS)
- Drawing up a cyber security strategy
- Checking your level of cyber security maturity
- Developing cyber security programmes
- Evaluating innovative technologies
- Cyber Resilience Service
- Awareness & Training Service
- Incident Response Service
- Verifying the cyber security strategy
- Red Team assessment
- Implementing and auditing the GDPR (General Data Protection Regulation)
Protecting industrial installations (OT/ICS)
We provide support for companies to identify, examine and overcome cyber security risks in the industrial environment, including cyber attacks on operational technologies (OT) and industrial control systems (ICS). In this context, we prioritise solutions that are appropriate in terms of business management and operational aspects.
Drawing up a cyber security strategy
A precise analysis of cyber threat scenarios is essential to ensure appropriate protection for the company. We take the analysis as the basis for developing practical and specific measures. These are then prioritised and incorporated into a comprehensive cyber security improvement programme.
Checking your level of cyber security maturity
We analyse and assess your cyber security capabilities on the basis of proven standards that guarantee a comprehensive overview. This analysis is based on interviews with specialists from various areas of your company.
Developing cyber security programmes
Based on a comprehensive review of your company’s cyber security capabilities, we draw up a detailed proposal for implementing a multi-year cyber security programme. This comprises the necessary work and the priorities for it, the resources required, the timeline, dependencies, critical success factors, and the governance needed to implement the programme.
Evaluating innovative technologies
As digitalization advances, the risks presented by cyber attacks – and the diverse forms they can take – are on the increase. Cyber players who launch attacks make use of the latest technologies and approaches. This means that developments in the cyber security sector are moving at tremendous speed. Things are becoming more complex – but we will help you find the right solutions and partners to meet the challenges you face.
Cyber Resilience Service
Take advantage of our Cyber Resilience Service to strengthen your company’s resilience against cyber attacks. We will develop an Incident Response Plan and the related runbooks for various application cases. As the last step, we will introduce threat intelligence: this also allows threat hunting – the key to gathering relevant information so that risks can be identified.
Awareness & Training Service
Cyber criminals exploit ignorance. Raise the level of awareness about cyber security in your company. Our Awareness and Training Service identifies your company’s individual requirements for the content of cyber security training courses, as well as the people who should be trained.
Incident Response Service
Our Incident Response Service helps you to respond to security incidents both actively and reactively. “Active” response means that we use threat intelligence to develop and run threat-hunting scenarios in your environment: this involves proactive and iterative searches of your networks to identify threats. “Reactive” response means that we provide you with support from our specialists in the event of an attack.
Verifying the cyber security strategy
We analyse the business model and the architecture of the digital ecosystem to achieve optimum reduction of cyber risks. To do this, we identify the key risks and take them as the basis for developing the necessary security measures.
Red Team assessment
A Red Team assessment is a method of systematically testing an enterprise’s defensive measures against cyber attacks. During the assessment, the Red Team thinks and acts just like a cyber attacker, in real time – but it does not cause any damage. This makes it possible to verify the company’s own defensive strategies, represented by its Blue Team.
Implementing and auditing the GDPR (General Data Protection Regulation)
We develop the measures you need to establish data protection as a sustainable element in your organisation. We create transparency by identifying, documenting and prioritising gaps in compliance with the General Data Protection Regulation (GDPR). Our expertise also includes GDPR audits.