- What IT security strategy does an organization pursue?
- Which standards and norms does the company/agency follow when deriving measures to improve cybersecurity?
- How effective are controls already in place? Which controls are still missing?
- Which roles are defined in the area of IT security and which binding documents regulate their cooperation?
- Which technical solutions are used to detect and prevent digital attacks?
We answer your questions:
We support the selection and implementation of an IT security framework
As external IT auditors, we have helped numerous organizations audit their IT infrastructure, assess identified organizational and technical vulnerabilities, and derive and implement holistic cybersecurity frameworks.
Jeanette Fürst
TIMETOACT GROUPContact