We review your existing security organization and identify deviations between the current status and the requirements of ISO/IEC 27001. This provides you with a detailed overview of necessary measures.
Together we determine which parts of your organization, systems and processes are to be included in the ISMS. A clear scope is the foundation for successful certification.
We help you set up and maintain all relevant documentation - from security policies to process descriptions. This ensures that your ISMS is both auditable and understandable for your employees.
Whether internal audit or external certification: We accompany you all the way. Through workshops and trial runs, we ensure that you are optimally prepared and can provide all the evidence that auditors expect.
Information security depends on the people who implement it. That's why we attach great importance to awareness measures and targeted training for your teams. This is how you create a living security culture in your company.
ISO/IEC 27001 certification is highly regarded worldwide and creates trust among customers and partners.
The standard gives you a clear framework to systematically identify and manage all risks.
Many industries and laws require a documented IT security strategy. An ISMS according to ISO 27001 can provide decisive evidence here.
The ISMS encourages regular checks and audits so that you can quickly identify and rectify weaknesses.
This depends heavily on the size and complexity of your company. Smaller organizations can often achieve initial success in a few months, while larger companies may need a year or more. A realistic time plan can only be made on the basis of an initial GAP analysis.
The costs vary depending on the effort, company size and project scope. We will be happy to provide you with an individual offer tailored to your specific requirements.
No, you can also set up an ISMS in accordance with ISO 27001 without being certified. However, official certification creates additional trust with customers, partners and authorities.
We carry out internal audits and test runs and give you feedback on any weaknesses in the processes or documentation. We also train your employees to ensure that all security measures are understood and implemented.
Absolutely. An ISMS lives from the people who implement it. We attach great importance to involving your team at an early stage, providing regular training and establishing a security culture.