We will carry out an initial standard assessment with you, which will result in a further cyber security check. In doing so, we adhere to the guidelines of the BSI / ISACA with the following steps:
Definition of the subject of assessment
Disclosure of the procedure
Choosing the appropriate assessment method
Decision of binding targets for action
Presentation and discussion of the valuation scheme
Preparation of an assessment report
Safe, integrated work environment away from individual standard building blocks. A central security source for you.