01
IT Baseline Protection & ISMS
Building and developing information security management systems according to BSI IT baseline protection. From structural analysis to certification preparation.
BSI-certified expertise
IT security consulting for federal agencies and the public sector. BSI baseline protection, ISMS setup and emergency management.
Expertise
Specialised IT security consulting for the public sector – from concept to implementation.
01
Building and developing information security management systems according to BSI IT baseline protection. From structural analysis to certification preparation.
02
Systematic identification, assessment and treatment of IT risks. Development of risk-appropriate measures and security concepts according to BSI standards.
03
Design and implementation of business continuity management according to BSI 200-4. Emergency planning, exercises and recovery plans for critical IT systems.
04
Consulting on GDPR-compliant processing of personal data in public authorities. Creation of processing records, TOMs and data protection concepts.
05
Independent review of the IT security posture through structured audits. Gap analyses, maturity assessments and recommendations for management.
06
Development and delivery of security training for employees and IT managers. Awareness campaigns and e-learning concepts.
Context
Focus on regulated environments and security-critical organisations.
Public Sector
Experience with BSI-regulated environments, classified information infrastructures and the specific security requirements of public administration.
KRITIS
Consulting for KRITIS operators under §8a BSIG. Demonstrating adequate security measures, reviewed by BSI-approved auditors.
Mittelstand
Pragmatic IT security without bureaucratic overhead. Security concepts tailored to your business that do not slow down operations.
Approach
Structured, results-oriented, without unnecessary complexity.
01
Quick orientation in the existing IT landscape. Structured capture of the current situation without weeks of assessments.
02
Pragmatic security concepts that address risks according to their actual relevance. No paper exercises – measures that work.
03
Supporting implementation through to go-live. Close coordination with IT operations, data protection and management.
04
Results that can be used internally. Clear documentation, training and handover to your own organisation.
Contact
We usually respond within 24 hours. For urgent matters, please contact us directly by email.