In order to optimize our website for you and to continuously improve it, we use cookies. By continuing to use the website, you consent to the use of cookies. For more information on cookies, please refer to our Privacy Policy.
Cybersecurity_12_1920x540

GOVERNANCE, RISK & COMPLIANCE

We support you in implementing internal processes and procedures, and we guide you through a compliance check and analyse your IT landscape to identify risks.

GOVERNANCE AND COMPLIANCE MANAGEMENT

Compliance and internal governance services are part of a company's value proposition: compliance with statutory requirements, regulations and agreed business rules. Let us help you define internal processes and procedures, implement and monitor them and advise you on fulfilling and implementing GDPR requirements in your IT infrastructure, in the cloud and on end-user devices. What we offer:

General compliance topics:

  • Compliance Initial Analysis (1-day workshop)

Data Compliance (GDPR):

  • GDPR Initial Analysis (2-day workshop with focus on SAP)
  • GDPR Functional Specification and Implementation (Consulting)
  • GDPR Package (with focus on SAP HCM)
  • GDPR in the Cloud (SAP SuccessFactors & Consulting)
  • GDPR Initial Analysis on Data Protection in Office 365 (1-day workshop)
  • Data Classification (Consulting)

Licence Compliance (Contracts):

  • Cloud Software Licensing (Consulting)
  • Microsoft Contract Models (Consulting)
  • Licence Management Processes (Consulting)

Process Compliance (Consulting on GDPR & business processes)

  • how mature is your company when it comes to the GDPR implementation?
  • are there descriptions for all processes relevant to data protection?
  • what do you know about your Microsoft licences at the click of the mouse?
  • how do you handle personal data?
  • have your onboarding and deboarding processes for employees already been documented and do you provide regular training on compliance issues?

Do you need support?

FIND OUT MORE FROM OUR EXPERTS

HighlightTeaser_1310pix_CCWebsiteGRC

OUR COMPREHENSIVE IT SECURITY ANALYSIS

IT SECURITY ASSESSMENT

Find out everything you need to know about the current condition to evaluate it, identify specific fields of action and determine appropriate measures to increase security.

RISK MANAGEMENT

For many companies, the starting point for developing an individualised security strategy is a check-up on security measures. Let us help you design a strategy tailored to your company, ensuring greater IT security, and build a roadmap. This is based on the results document of the IT Security Assessment and the fields of action derived from it. Additional analyses to reinforce security:

  • IT Security Assessment (2-day workshop)
  • Shadow IT Analysis (1½-day workshop)
  • Active Directory Vulnerability Check
  • Consulting & Active Pen Testing
  • User Awareness (tools/training/e-learning)
  • Data Protector for SAP (consulting, design, implementation & licensing)
  • Mobile Endpoint Security (consulting, design, implementation & operations)

FIND OUT MORE FROM OUR EXPERTS

  • What data, information and applications should you protect at your company? For what company data is protection most critical?
  • do you depend only on security awareness measures to ensure your employees protect your enterprise value, or do you take advantage of security technology?
  • how mature is security at your company? Do you have comprehensive protection?
  • what is your modern approach to protecting identity and information in the multi-cloud world from cyber-attacks?
  • when you become a target: can you recognise the signs of a cyber-attack? Are you in a position to take quick action?

Do you need support?

WE HAVE PROVEN TO CUSTOMERS THE PRESENCE OF 500 CLOUD APPLICATIONS ALONE OF WHICH THEY HAD PREVIOUSLY BEEN UNAWARE.

CHRISTIAN LECHNER, SENIOR CYBERSECURITY ARCHITECT & ETHICAL HACKER ALL FOR ONE GROUP