Conduction of a Business Impact Analysis on the basis of critical core processes and key data of the company
Determination of protection needs with respect to availability, confidentiality and integrity
Threat Analysis
Identification of threat scenarios by assessing potential threats and attacks vectors to core processes and data
Mapping of threat scenarios to results of business impact analysis
Control Maturity Assessment
Structured assessment of the maturity of security controls across the company (product and customer departments, IT, Organisation, HR, Facility Management, etc.).
Description of weaknesses and potential impacts
Mapping of weaknesses to relevant threats and priorisation according to the business impacts
Roadmap
Deriving a suitable cybersecurity strategy for your specific business model
Prioritised measure list to adress the most critical cyber threats
Definition of a roadmap for implementation
Implementation
Optional support of implementation
Move the cursor over the elements to get more information