Information Security

Our goal is to protect your corporate data and ensure its confidentiality, availability and integrity - for your company's safety. Let's get it on.

Get in touch

productportfolio

OUR Offer

Together with you, we ensure the confidentiality, availability and integrity of the data for which you are responsible. In this way, you not only defend your data stores, but also your good reputation. We are happy to support you with our expertise.

security.Holisticon_Informationssicherheit_1

Your sensitive data and systems need protection

Your company’s sensitive information can be found within processes, systems and on data carriers. That’s why you need an ISMS to consistently protect your systems and data. Implement security measures and a continuous improvement process in your company. We would be happy to support you in setting up and implementing an ISMS in accordance with ISO 27001 or BSI IT-Grundschutz.

An ISMS protects your company against:

  • Outside attacks
  • Damage to your reputation
  • Significant loss of data
  • Monetary losses
  • Liability risks and lawsuits
  • Corrupted integrity of data and information
Informationssicherheit_InternesAudit

Audit your security in moderation

Before an external audit by an accredited body, an internal audit must be performed for an ISMS. Our experienced consultants will be happy to support you in this. We ourselves operate an ISMS in accordance with ISO 27001. Thanks to our extensive experience, we know what auditors value and can adequately prepare for the external certification audit.

Our internal audit ensures:

  • Comprehensive gap detection
  • Extensive documentation
  • Elimination of existing gaps before external audit
  • Optimal preparation for external audit
Holisticon.security_Informationssicherheit_Notfallmanagement

Emergencies are not acts of god

What happens when your most important IT system goes down? How long can this system be offline before your company suffers significant damage? We can help you set up an emergency management system in accordance with BSI Standard 100-4.

Do you know how to prepare for an emergency?

  • Running through possible emergency scenarios
  • Documentation of individual emergency plans
  • Emergency exercises for employee awareness
  • Definition of responsible persons and actions for emergencies
  • Smooth emergency management
GapAnalyse

Identify gaps in your security

Feeling overwhelmed by the flurry of regulatory, legal and customer requirements for information security? An individual gap analysis helps you identify the current status of your company with regard to your security. We’d be happy to assist you in preparing it.

Close the gaps and create security:

  • Variance analysis
  • Concrete recommendations for actionables
  • Security awareness
  • Increase the security of your company
  • Protection against loss of data and reputation
security.Holisticon_security-team_jacky_lukas_martin_HERO

Don't take risks

In the IT sector, risk management is extremely important. If you don’t think about security right from the start or monitor it continuously, your security risk is immense. Our security experts will work with you to ensure an environment without unnecessary risks. With the introduction of our tailor-made risk management, your company will benefit in the long term from a stable, secure and compliant IT, e.g. according to ISO 27005 and 31000.

Risks are calculable:

  • Identification of information security risks
  • Evaluation of potential impacts
  • Definition of mitigation measures
  • Design of a security risk management
  • Integration into your existing risk management
Informationssicherheit_DataGovernance

Data governance - secure efficiency

Are you processing your data efficiently and getting everything out of it? Together with our Smart Data and AI team, we show you how to get the most out of your data, and we’ll help you do it securely and compliantly. -> Want to dive deeper into the world of data? Then take a look at our website. (LINK Smart Data subpage)

Use your data securely:

  • Efficient and secure data aggregation
  • Identification and adherence to compliance requirements
  • Compliance with DSGVO requirements
security.Holisticon_Informationssicherheit_AwarenessTraining

Corporate security is a team sport

The strongest firewall is your team; by implementing a strong security awareness in tandem with our security experts,
you ensure your company’s safety in the long term.

Team success is guaranteed:

  • Designing phishing campaigns
  • Unplanned security drills
  • Exciting security quizzes
  • Informative awareness trainings

Our experts in action

How we work

In our short video, information security expert Jacqueline Striewe tells us how we can solve your challenges. Summarized briefly for you.

Cover play icon

Meet our experts

The Team

From data protection and information security to more technical IT security - with us, you will find experienced security consultants who will competently master your individual challenges. And they are certainly aware of their responsibility towards your company. Get in touch with us!

Sicherheit Christian Westerkamp

Christian Westerkamp

Data Protection

Unconventional lawyer, passionate and listening advisor with an eye for the essentials and practical solutions. Seekers of gray areas and keeper of data protection. Considers Information Security important.

ChristianSchade

Christian Schade

Information Security

Is a pragmatic solution finder and fear monger on topics related to data protection and information security. He likes the lively exchange in different facets.

Christian's workshops

JuliaVill

Julia Vill

Data Protection

Data protection enthusiast who loves to create pragmatic solutions for customers and inspire your environment with the GDPR. A penchant for taking care of things, organizing, optimizing.

ChristianPaulsen

Christian Paulsen

Information Security

Is a pragmatic solution finder and fear monger on topics related to data protection and information security. He likes the lively exchange in different facets.

Contact us

How can we protect you? Our security experts are happy to help. Get in touch with us.

    Thank you!

    Your request has been submitted!

    Thank you for your inquiry. We are looking forward to hearing from you. Our security experts will get back to you in 1-2 working days.