Suppliers in the automotive industry are required to implement TISAX® (Trusted Information Security Assessment Exchange). We are specialists for consulting around the introduction of a management system based on the TISAX® standard of the VDA. We contribute our expertise as lecturers for the TÜV-SÜD Academy, among others.
A certified management system according to ISO 9001 offers an organization clarity and transparency with regard to roles and tasks as well as company processes. The underlying continuous improvement process enables the company to work constantly on itself to meet the changes in the working environment. We help you to establish such a management system with pragmatic approaches.
All standards and management systems introduced in the company can only be successful if both managers and employees know what they are allowed to do and what they have to pay attention to. We are happy to assist you in this respect by means of training or targeted awareness measures.
IT security and cyber-security are usually quite unpopular topics. Nevertheless, implemented standards such as ISO 27001 protect against potentially enormous IT damages. With the right guidance, the introduction of such management systems is not too painful. We have the expertise and practical experience to set up simple, pragmatic and at the same time effective solutions.
Penetration tests (or PenTests for short) are targeted, simulated attacks on your IT infrastructure, just as they would be carried out by hackers. It makes sense to run pen tests after an IT architecture and vulnerability analysis in order to know very specifically on a technical level where improvements need to be made. Together with our partners, we are also available for this purpose.
With the EU DSGVO, data protection has become an important issue for companies. If you have already established other management systems, e.g. according to ISO 9001 or ISO 27001, it is comparatively easy to extend the scope of data protection or ISO 27701. We can show you how you can leverage synergies here and contribute our practical experience.
If you want to know how good your technical protection against external attacks is, it can be worthwhile to carry out an IT architecture and vulnerability analysis. For this purpose, we would examine your IT architecture together with you and prepare a report with potential vulnerabilities as well as severity levels, in order to determine with you at the end of the process whether and how these vulnerabilities should be countered.
An ICS, e.g. in accordance with ISAE 3402, offers a whole range of advantages that are initially not obvious to entrepreneurs and owners: Fulfilment of legal requirements regarding protection of investors and creditors, as well as reduction of litigation risks, protection of assets and prevention of manipulation possibilities. We advise you on the introduction of an ICS, whereby we place great value on common sense and a sensible risk assessment.