Hardening Baseline

Insecure system settings pose a major security risk. Our Hardening Baselines provide you with immediate configuration support. From Windows systems to firewalls, switches, PLCs and more.

IT Security Management

Are you interested in setting up an Information Security Management System (ISMS) for your company or do you need to set up such a system as a regulatory or contractual requirement? We are happy to help you achieve this on the basis of ISO 27001. Just contact us for more details.

PMO

IT Security Law, NIS Directive, Network Security, Audits and so much more. Security and the demands it creates can often be a lot to handle and lead to chaos. We support you with our Project Management Office to organize the whole thing and thus guarantee a smooth process.

KRITIS/IT-SiG

Are you an operator of a critical or essential infrastructure and do you fall under the IT Security Act or the NIS Directive? You do not know exactly how to meet the requirements of the authorities or you lack personnel resources to process the requirements?

Then we can most likely help you. Our staff has experience in communicating with authorities and appropriate contacts and will help you to pragmatically meet the regulatory requirements that apply to you.

ICS / OT Security

Do you have a critical infrastructure or enterprise in operation with OT devices? We help you find and implement appropriate measures to protect your business and employees from attacks.

CISO-as-a-Service

The Chief Information Security Officer has a central role in a company’s cyber security. If you do not yet have a CISO in your company or need short-term support for your CISO to cover a peak load in the context of projects or incidents, we will be happy to assist you.

Security Assessments

You have a system or a company and would like to have it audited with regard to security?

We support you in this process and check your system or your business for possible vulnerabilities that an attacker could exploit. In this context, we not only consider IT attacks but also potential problems in the areas of physical security and vendor management.

Network Security

Vulnerabilities in the communication between components of your system represent a major security risk. Whether their existing network needs to be scanned for vulnerabilities or they are still looking for a way to securely network their components. We support you every step of the way.

Site Assessments

You already have a site in operation and would like to have its safety checked? We analyze not only IT vulnerabilities, but also phyical entry points for an attacker.

Vulnerability Scanning

You have a system and want to have it scanned for vulnerabilities?

Whether before or after go-live, we can support you and check your system or operation for potential vulnerabilities that an attacker could exploit.

CyberShield-Consulting – Securing your IT