Security Strategy & Organisation

Security Strategy & Organisation

CISO as a Service

CISO as a Service - Strategic Information Security for Your Company

Weibliche Chief HR Officer sitzt mit Mann zusammen und lacht

Business Continuity Management

BCM includes risk assessment, response planning, recovery, and the long-term maintenance of policies and procedures developed, tested, and implemented for crisis management. Our experienced security consultants guide you through the following steps to establish a robust Business Continuity Management system (including an emergency manual and disaster recovery plan).

  • Conduct a Business Impact Analysis
  • Identify the critical elements of your organization
  • Identify opportunities for risk mitigation
  • Determine options for preparing for the loss of critical elements and for recovery after such a loss
  • Prepare and plan how to act during and after a crisis
  • Continuously update and test the Business Continuity Plan

Information Security Management System

An ISMS (Information Security Management System) is a management system for information security that defines rules, methods, and processes to ensure information security within an organization. Its purpose is to protect information and minimize risks related to its processing. An ISMS covers the following areas:

  • Policies and Procedures: Define how information should be protected and processed
  • Responsibilities: Define who is accountable for specific aspects of information security
  • Continuous Improvement: The ISMS is an ongoing process that is regularly reviewed and updated
  • Risk Assessment: Identify and evaluate potential threats and vulnerabilities
  • Protective Measures: Implement measures to reduce risks

ISO 27001 Audit Support

Supporting companies in the implementation and certification of an Information Security Management System (ISMS) according to the international ISO 27001 standard. This support can take various forms, from consulting and implementation to preparation for certification. Typical tasks include:

  • Consulting on the planning and creation of the ISMS
  • Assistance with the implementation of technical and organizational security measures
  • Preparation of the necessary ISMS documentation such as policies, procedures, and work instructions
  • Conducting internal audits and pre-assessments
  • Support throughout the certification process

Don't hesitate to contact me.

Markus Kaegi

Business Unit Lead - Cyber Security

markus.kaegi@isolutions.ch
Markus Kaegi

More from Cybersecurity