Jobs

IT Security / IT Compliance

Cybersecurity and Data Governance more complex and necessary than ever

Security, i.e., information security and data protection, have become a "must have" in both the digital and analog worlds. Reports of incidents prove this relevance almost weekly.

One thing is clear: without adequate security precautions, every company is at the mercy of today's diverse threat scenarios. In addition, the demand on integrated enterprise risk management systems is becoming ever higher due to the increase in flexibility of global markets and the increasing standardization of laws and jurisdictions. There can be no such thing as complete security, but which measures make sense in which situation and with which budget? We would be happy to help you find and implement suitable solutions!

Creating the conditions for effective protection of the most important information assets and adhering to the far-reaching compliance requirements is also one of the core tasks of a company's management.

Transformation of Cybersecurity

Detecon distinguishes itself in the implementation of security & compliance across all industries through a combination of a deep understanding of the technical-strategic requirements and a high level of technology and implementation competence. To this end, we work together on an interdisciplinary basis and across national borders with our  colleagues in Switzerland and Austria. 

As experts for cybersecurity, information security and data protection (privacy), we analyze, evaluate and improve your concrete security and threat situation as well as your overall position with the help of risk- and value-based methods. Our goal is to guide your development securely into the digital future and establish resilient cyber defenses for digital business models, products and services.

Risk and Security Maturity Assessment

 

  • Assessment of the current Cyber Security Level
  • Development of a Cyber Security Strategy incl. Ambition Level
  • Definition of a Cyber Security Maturity Model based on international Standards (e.g. CMMC, C2M2, NIST CSF, ISO27001, etc.)
  • Implementation of an overarching Security Management Process
  • Set-Up of an OKR-based program steering

 

 

Data Protection & Privacy (GDPR)

  • Technical assessment of the current data privacy level
  • Development of a data privacy and security strategy incl. Ambition Level
  • Implementation of an overarching data privacy & security Management Process
  • Support in case of personal data breach: notification and interaction with supervisory authority

Security Strategy Development & Governance

  • Assessment of the current Cyber Security Level and organizational set-up and priorities
  • Identify key areas for improvement and to bolster organizational mission
  • Define a roadmap for implementing strategy 
  • Ensure adequate documentation for sustainability of strategy
  • Implementation of an overarching Security Management Process

ISMS / Information Security Management

 

  • Assessment of the current Security Level and "Risk Appetite" / Ambition Level
  • Development of a Cyber Security Strategy ialigned with ISMS, DSMS, BCM and Compliance
  • Definition of a Cyber Security Maturity Model based on international Standards (CMMC, C2M2, NIST CSF, ISO27001, BSI, ENISA)
  • Implementation of an overarching Security Management Process
  • Set-Up of an OKR-based program steering

 

Identity and Access Management

 

  • IAM & PAM concepts & policies
  • Governance & process (re-)design
  • Role and resource based IAM & PAM approach
  • Integrate future identity management (brokerage, federations, SSI)
  • Tool implementation

 

Cloud Transformation Security

  • Assessment of the Cloud Strategy
  • Conceptualization of a secure Cloud Landing Zone
  • Alignment of Cloud Setup with standards like ISO 27018, ENISA Standard, CCSK or NIST SP 500-291
  • Support in comparison of cloud native solutions and market-ready tools (e.g. CASB)

Thought Leadership Newsletter

Stay tuned and subscribe to our monthly reading.
Diese Seite teilen