Consultancy on all aspects of information security

Customized information security solutions for SMEs. Protect your data and systems effectively against threats while meeting all regulatory requirements.

Get started now with a free initial consultation!

Our Information Security Services for SMEs

We offer comprehensive information security services tailored specifically to the needs of SMEs. Our goal is to protect your data, systems, and business processes from potential threats while meeting regulatory requirements.

Risk management and threat analysis

We identify potential risks and threat scenarios for your IT infrastructure and assess their impact on your company. We take targeted measures to minimize the risk of security incidents.

Implementation of an ISMS according to ISO 27001

We assist you in implementing an information security management system (ISMS) according to ISO 27001 to ensure the long-term confidentiality, integrity, and availability of your information.

Implementation of an ISMS according to TISAX®

Companies in the automotive industry need to implement an information security management system following the TISAX® Automotive Standards. This allows you to meet the strict requirements for information security and data protection in the supply chain.

ISMS Review

Do you already have an ISMS in place and would like to develop it further? With our consulting services, we review your existing ISMS, identify vulnerabilities, and provide specific recommendations for optimizing and improving security standards.

Creating an information security concept

An information security concept is a strategic document that defines a company’s security objectives, guidelines, processes, and technical measures to ensure information security. The systematic protection of data and IT infrastructures against threats such as cyberattacks, data loss, or unauthorized access is transferred into a concept.

Preparation for certification

We support you in preparing for certification according to the 27001 or TISAX® standards so that you successfully meet all requirements and pass the audit processes.

Internal audits for TISAX® and ISO 27001

A structured assessment of your systems is necessary to ensure the security of your information. Through regular internal audits, you can ensure that information security has been successfully implemented and meets the requirements of the authorities and other institutions.

Strategic consulting on information security

Strategic consulting focuses on long-term information security objectives. It defines these goals and helps to achieve them. We consider current threat scenarios and technological developments so that you are always up to date.

Project support and coaching

With comprehensive security consulting, companies can effectively manage the threats to their information security. We use our consultants’ expertise to support and coach your projects to achieve compliance with security-related standards.

Our consultants will support you during the auditing and certification of your ISMS according to ISO 27001 to ensure compliance with the German Federal Office for Information Security (BSI) requirements.

Employee training and awareness programs

Training your employees is crucial for IT security and information security. Comprehensive training based on BSI IT-Grundschutz strengthens information security management within the company.

Customized training courses continuously improve information technology security. This allows cyber security to be successfully established and maintained.

Business Continuity Management

To ensure that your business processes remain operational even during a crisis, we develop and implement measures to sustain operations during IT failures or security incidents, minimizing disruptions.

Information security documentation

Thorough documentation on information security is crucial for establishing an information security management system (ISMS) in your industry. It includes guidelines, processes, responsibilities, and technical measures that define security standards and serve as a basis for audits, certifications, and the continuous improvement of information security measures.

Process up to the offer

Initial consultation via video conference

Our initial consultation is a no-cost, 45-minute video conference. This innovative form of counseling allows clients to conveniently receive remote support. Benefit from professional expertise and individual advice, without long journeys.
Take the opportunity to have your questions answered and get valuable tips in a video conference. The free consultation is an excellent way to plan your first steps and get professional advice.
This standardizes processes, and all employees know exactly which steps to follow when backing up data. By implementing an ISMS according to ISO 27001, you minimize the risk of security breaches.

Needs analysis of the security requirement with the help of a GAP analysis

A needs analysis of security requirements using a GAP analysis is a systematic process in which a company’s current information security measures are compared with the desired or required standards. The aim is to identify vulnerabilities (GAPs) and, based on these, determine the actions required.

The process is explained here in several steps:

We support you in ensuring that all relevant regulations for information security are complied with. Our advice and audit preparation services help you avoid fines and damage to your reputation, while also reassuring your customers and business partners about the security of their data.

1.Definition of the targets

As a first step, the desired objectives are defined that the company wants to achieve about information security. This may refer to specific certification standards (such as ISO 27001, TISAX®) or internal security requirements intended to protect operations and data. These targets serve as a benchmark against which the current measures are measured.

Based on this analysis, we develop measures to improve the protection of your IT infrastructure (IT systems) and sensitive data. This means you are prepared for potential IT security threats and can react quickly to ensure the integrity and availability of information.

2. Assessment of the current status

The next step is to determine the current status of the existing measures. This involves checking which technical, organizational, and procedural security measures are already in place. This concerns

  • Technical measures such as firewalls, encryption, and backup solutions
  • Organizational measures such as guidelines for handling data, access control concepts, role allocation
  • Processes such as emergency and recovery plans, regular security checks

This inventory is often conducted through interviews, document reviews, and system checks.

3. Comparison of current and target status

The current status is compared with the defined target specifications. This shows where deviations exist. In other words, where information security requirements are neither fully met nor implemented. This comparison is the core of the GAP analysis.

4. Prioritization of risks

Not all GAPs are equally critical. Therefore, a risk analysis is carried out in which the security gaps are prioritized according to their threat scenarios and impact on the company. Factors such as the probability of a risk occurring and the potential damage (such as financial losses or reputational damage) are considered.

5. Creation of an action plan

An action plan is prepared based on the identified gaps and their priority. This plan contains concrete steps to close the GAPs. Some examples are:

  • Introduction or improvement of access controls
  • Implementation of new technical security measures such as firewalls or SIEM (Security Information and Event Management)
  • Development and implementation of training programs for employees

Quotation for information security consulting

First, the specific needs of the company are discussed based on the action plan and the presentation of results and transferred into an individual offer. Then a clearly structured service offering is created, with a detailed description of the services offered.

These also include pricing models that are attractive for both small and large medium-sized companies. You will receive a transparent list of costs and possible additional services from us.

Starting the consultation

Our team will work intensively with your specific needs to develop a customized strategy.
We will schedule regular meetings to review progress and ensure that all measures match your expectations. During this phase, we will also conduct relevant analysis and give you valuable insights that will help you make informed decisions.

Providing you with the best possible support and a transparent communication flow is our goal.

Advantages of information security consulting

Our consultation not only ensures that your IT infrastructure is secure but also builds trust with customers and business partners. You benefit from a structured approach to risk mitigation and years of expertise.

Benefit from our certified consultants

Our experienced consultants are certified following 27001 and TISAX® and contribute extensive industry knowledge and practical experience from over 50 projects.

Über den Berater

Consultancy on All Aspects of Information Security

Can Adiguzel ist der Gründer von 360 Digital Transformation. Er ist TISAX-Berater und ISO 27001 Lead Auditor. Er ist seit mehr als 11 Jahren im IT-Projektmanagement tätig. Seine Leidenschaft ist die Informationssicherheit für den Mittelstand und er hilft dem Mittelstand bei der Bewältigung seiner Herausforderungen im Bereich der Informationssicherheit mit einem praxisnahen Beratungsansatz.

Customized solutions

We do not offer off-the-shelf solutions. Every measure is individually tailored to your company and your needs.

Rich expertise

We use our expertise in the information security field to support you in implementing proven security measures and complying with legal requirements.

Customer Reviews

Our goal is to achieve 120% customer satisfaction. So we will do our best until we reach that level. Here are some testimonials from our customers.