Security Strategy & Organisation

Security Strategy & Organisation

Strategic Information Security

CISO as a Service

As an SME, you are in a challenging position. To ensure information security, the involvement of a CISO is recommended. However, a full‑time position is unnecessary. Resources and the required expertise are often limited.
Our CISO‑as‑a‑Service model gives you access to an experienced Chief Information Security Officer who supports and guides your company.

Weibliche Chief HR Officer sitzt mit Mann zusammen und lacht

Systematic preparation

Business Continuity Management

BCM includes risk assessment, response planning, recovery, and the long‑term maintenance of the policies and procedures developed, tested, and implemented for crisis management.
Our experienced security consultants guide you through the following steps to establish a robust Business Continuity Management system (including an emergency manual and a disaster recovery plan).

Links Mann am PC und Frau hinten am Fenster angelehnt mit Laptop und Headset

Information Security Management System

An ISMS (Information Security Management System) is a management system for information security that defines rules, methods, and processes to ensure information security within an organization. Its purpose is to protect information and minimize risks related to its processing. An ISMS covers the following areas:

  • Policies and Procedures: Define how information should be protected and processed
  • Responsibilities: Define who is accountable for specific aspects of information security
  • Continuous Improvement: The ISMS is an ongoing process that is regularly reviewed and updated
  • Risk Assessment: Identify and evaluate potential threats and vulnerabilities
  • Protective Measures: Implement measures to reduce risks

ISO 27001 Audit Support

Supporting companies in the implementation and certification of an Information Security Management System (ISMS) according to the international ISO 27001 standard. This support can take various forms, from consulting and implementation to preparation for certification. Typical tasks include:

  • Consulting on the planning and creation of the ISMS
  • Assistance with the implementation of technical and organizational security measures
  • Preparation of the necessary ISMS documentation such as policies, procedures, and work instructions
  • Conducting internal audits and pre-assessments
  • Support throughout the certification process

Don't hesitate to contact me.

Katarina Nikolic

Cyber Security Consultant
Bachelor's Degree in Information Science & Digital Business Management

katarina.nikolic@isolutions.ch
Katarina Nikolic

More from Cybersecurity