HOW WELL IS YOUR DATA PROTECTED?

TEST YOUR ORGANIZATION, TECHNOLOGY & AWARENESS WITH THE CYBER SECURITY CHECK 

Every day the media reports about successful cyber attacks on businesses, which cause significant financial and reputational damage. How well are you protected against such attacks?

STRONG CYBER SECURITY DESPITE DIGITALIZATION

Driven by digitalization, you process, store and transmit large amounts of sensitive information on a daily basis via a wide variety of IT systems and applications.

To ensure the security of digitally processed information, the requirements of external bodies (for example, via laws or industry standards) for information security in your company are constantly increasing.
Your customers also trust you with efficiently protecting their data against cyber attacks.


PROTECT YOUR DATA

Based on internationally recognized standards of information security (ISO/IEC 27001:2015, ISO/IEC 27001:2017, BSI IT-Grundschutz, PCI DSS, NIST Cyber Security Framework), the recommendations of ISACA, ISC2 and the German Federal Office for Information Security, as well as current best practices, we conduct a Cyber Security Check at your premises. We will thoroughly check your organization, technology and the awareness of your employees.


WHAT WE DO

We customize each Cyber Security Check to your needs and circumstances. Usually it includes the following phases:

  • PHASE 1

    Analysis and definition of the scope

  • PHASE 2

    Planning and preparation

  • PHASE 3

    On-site and off-site assessment

  • PHASE 4

    Reporting and presentation of results

  • PHASE 5

    Optional: Consulting on the implementation of recommended measures

  • PHASE 6

    Optional: Update of the final report and provision of a test certificate

  • PHASE 7

    Optional: Additional assessments

WHAT WE TEST

Within the framework of the Cyber Security Check, the following fields are thoroughly reviewed by usd AG experts:

  • Protection of network transitions
  • Malware defense
  • Inventory of the IT systems
  • Prevention of exploitable security vulnerabilities
  • Secure interaction with the internet
  • Log data collection and evaluation
  • Ensuring an up-to-date level of information
  • Management of security incidents
  • Secure authentication
  • Ensuring the availability of necessary resources
  • Physical security
  • Secure software development
  • Performance of technical security analyses
  • Secure handling of cloud applications
  • Awareness raising and training of employees
  • Information security governance
  • Configuration management


WHAT YOU RECEIVE

After completion of the Cyber Security Check you will receive detailed and reliable results on the security level in your company:

  • A detailed final report on all relevant topics
  • A catalog of measures with concrete recommendations
  • Presentation of the results on your premises or remotely
  • Consulting on the implementation of necessary measures
  • On request, an assessment of the compliance of your company with security standards such as ISO/IEC 27001:2015, ISO/IEC 27001:2017 and PCI DSS

LEARN MORE

Expert interview with Jan Kemper on the importance, procedure and best practices of a Cyber Security Check.

In our webinar Jan Kemper explained possible approaches and procedures of a Cyber Security Check.