Cyber Security Strategy and Management
• Implementation, assessment, or review of the Information Security Management System (ISMS)
• Information risk analysis and implementation of an information risk management system
• Assessment of information security maturity in the company
• Audit and regulatory compliance (NIS 2, ZKB/VKB, ISO 27001, and others)
• Design and implementation of:
- identity management system
- security elements in development (DevSecOps)
- security components in architecture
- cloud security and outsourcing
• Outsourcing of security roles