1 | 2 | 3 | 4 | 5 | 6 | |
risk analysis | securitystrategy | security audit | prepare the security plan | implementation of the plan | permanent follow-up |
1 | 2 | 3 | 4 | 5 | 6 | |
risk analysis | securitystrategy | security audit | prepare the security plan | implementation of the plan | permanent follow-up | |
risk analysis | risk analysis | interim security management | ||||
security strategy and policy | security policy | interim security management | ||||
security audit | ||||||
organization | organisation audit | interim security management | ||||
infrastructure | infrastructure audit | interim security management | ||||
organization and structure | ||||||
security department better performance | audit security department | approach | guidance and support | interim security management | ||
security culture | audit security culture | approach | support and training | interim security management | ||
regulations and international standards | audit based on standards | approach | guidance and support | interim security management | ||
technical specifications | pre-designs | designs | interim security management | |||
project management | concept and project plan | project guidance/ management |
interim security management | |||
awareness and trainingprograms | concept of training/ awarenessprogram |
organization of training | repeat training sessions | |||
procedures and instructions | interim security management | |||||
emergency and crisis plan, business continuity | concept | realization | test and training |
We use the following cookies on our various websites. You can manage your preferences for these cookies via the buttons below.
Essential cookies
These cookies are technically necessary to enable a normal visit to our websites. Given the technical necessity of these cookies, we only have an information obligation. These cookies are set as soon as you visit our websites.