Cyber Security & Privacy
Cyber events can quickly destroy corporate assets and damage an organization's carefully built reputation. Attackers focus on large and small private companies as well as public sector organizations. Attacks take place randomly or specifically on selected companies and can remain undetected for a long time.
Is your Cyber Security up to date and do you (still) have your business data under control?
Today, information security is one of the central topics in the economy.
Cyber security is cited by many responsible persons as one of the major threats. The enactment of new regulations at the European and national levels has made it increasingly compulsory for companies to achieve adequate protection against cyber risks and for data protection. Otherwise, penalties of up to 4% of Group sales could be imposed.
Appropriate cyber security management includes both forward-looking risk considerations and the development of resilience in the event of an incident. We help you protect your business by identifying cyber threats and building appropriate cyber security management. We help you align your cyber security with your strategic business goals and achieve sustainable results from strategy to execution. To do this, we take a holistic approach to cyber security and adapt our measures to your industry and organization.
Resilience in the area of cyber security
"Resilience is a characteristic, more than a skill." says Dr. Thomas Rhomberg, Head of Security Operations & Transformation at SIX Group.
In specialist interviews, Dr. Rohmberg answers interesting questions about resilience from SIX Group's practical experience.
We support you in all aspects of the implementation of modern Cyber Security Management
- Information Security Strategy & Governance
- Data protection: Compliance with European, national and industry-specific regulations
- Information Security: ISMS
- security awareness
- Concept Cyber Defence Center and Security Operation Center
- Incident Management
- Business Continuity Management, IT Service Continuity Management
- Cloud security and compliance
- Security Architectures
- network security
- Identity & Access Management
- Security Officer as a Service