At work for you - in a variety of roles
With many years of experience in the field of information and cyber security, we offer you independent and comprehensive advice in various roles. We support you in successfully implementing your security projects, gaining an independent view of the state of your security and strengthening your security organization - whether through targeted, short-term assignments or long-term support.
Security Consulting
Together with your team, we develop innovative concepts, robust architectures and future-oriented solutions to implement your security strategy.
Analysis, strategy and planning
We determine the need for action to optimize your cybersecurity through site assessments and risk analyses - comprehensively or in specific areas. Together, we develop your cybersecurity strategy, define measures and create an improvement program tailored to your organization.
Conception and evaluation
We develop customized security architectures and processes for you. Based on the specific needs of your organization, we define requirements for technical systems and solutions. In addition, we support you in the tendering and evaluation of suitable solutions and implementation partners.
Implementation and support
We draw up security specifications, provide support with the introduction of processes and train your employees. As a representative of your interests, we support the introduction of new products and services. We ensure that the implementation meets your requirements and that risks are addressed adequately.
Advisory
We support you with our security expertise and take on internal roles in your security organization - for example as CISO as a Service.
Strengthening the security organization
Whether as a supplement to your existing security organization or as part of a CISO as a Service mandate - we take on operational tasks in information security management and ensure that your security strategy is effectively planned, managed and implemented.
Our experienced experts will work with you to develop a cybersecurity program that encompasses the strategic and operational levels - from security architecture and organization to comprehensive cyber risk management and reporting to management and the board of directors.
As a trusted advisor for management and the board of directors, we provide you with independent and reliable support. Our many years of experience enable us to classify the current cyber threat situation, identify the main risks and derive well-founded recommendations for action for your company.
Audit & Review
Have your cybersecurity audited from an independent perspective in accordance with current standards and in an industry comparison. We uncover weaknesses and provide practical recommendations for action.
Site assessments and second opinion
Is your security, or specific parts of it, set up optimally? Does your security architecture cover the threats relevant to you and is it in line with common practice? Our assessments and second opinions provide you with clear answers and recommendations for action.
Maturity assessments and internal ISMS audits
Whether ICT minimum standard, NIST Cybersecurity Framework or CIS Controls - we audit your organization, processes and technology according to current standards. We assess your maturity, identify weaknesses, point out recommendations for action and provide benchmarks for market practice. We also carry out internal ISMS audits for you in accordance with ISO/IEC 27001.
Compliance and regulatory support
Whether FINMA, FOPH or FOT - we support you in preparing for audits by your supervisory authorities and ensure that your organization is well prepared for external inspections. Afterwards, we support you in assessing the findings and defining adequate measures.