security icon

Cyber Security-Check

We will carry out an initial standard assessment with you, which will result in a further cyber security check. In doing so, we adhere to the guidelines of the BSI / ISACA with the following steps:

  • Definition of the subject of assessment

  • Disclosure of the procedure

  • Choosing the appropriate assessment method

  • Decision of binding targets for action

  • Presentation and discussion of the valuation scheme

  • Preparation of an assessment report

Cyber Security-Check image

CISO-Digital: The CISO information platform with integrated added value.

Safe, integrated work environment away from individual standard building blocks. A central security source for you.

Free request