NIS-2 – Taking cybercrime resistance to the next level

The new NIS-2 Directive regarding critical facility resilience is in the pipeline and will affect a number of additional companies. Even companies that are not (yet) affected by the existing NIS Directive would be well-advised to align their IT security measures with it and take far-reaching security precautions.

Security assessments (multiple clients)

Regular IT security reviews, proper risk analysis and – based on these results – focused data and IT security concepts and measures help to reduce the threats of cyber attacks and ensure compliance with relevant data protection requirements.

Cloud transformation: Preparation

Defining an effective cloud strategy and overall considerations of cost-effectiveness are the key elements in good preparation

Support for outsourcing, offshoring and re-insourcing

During successful implementation of various sourcing projects (outsourcing/offshoring/re-insourcing), involvement of external expertise and experience proved to be a crucial success factor both in project management and in technical/content-related tasks