Skip to content
About Us
Close About Us
Open About Us
Team
Success Stories
Siemens
Bosch
Read ID
Swiss Sign
Johanniter
Centogene
ECOSPEED
RSB Logistics
Roche
Services
Close Services
Open Services
Information Security Management
BCM
Cyber Security
Data Privacy & Compliance
eIDAS & Trust Services
Certifications
IS-Implementation
Information Security according to EnWG
IS-Operation
BSI IT Baseline Protection
NIS-2
DORA
TISAX
AI-Governance
SWIFT
OT-Security
Data Center Security
Audits
Certifications
Setting up an ISMS in accordance with ISO 27001
ISO 27001 development plan
Gap-analysis in accordance with ISO 27001
IT Security Act & KRITIS
KRITIS Umbrella Act
Intrusion Detection Systems (IDS)
Information Security according to the Energy Industry Act (EnWG)
Transition ISO/IEC 27001:2022 for energy system operators and operators of energy systems classified as critical infrastructure
External ISO/CISO
Supporting IT Auditing and IS Auditing
Freshmaker
ISMS implementation in accordance with ISO 27001 based on IT-Grundschutz
Gap analysis ISO 27001 on the basis of IT-Grundschutz
NIS-2
DORA
TISAX® Gap-Analysis
TISAX® Transition ISA 6
AI-Governance
SWIFT-Assessment
Industrial Security Concepts – IEC 62443
Data Center Certification
Examinations according to §8a (3) BSI Act
Internal ISMS audit / first party audit
Accredited
In-house certificates
BCM-Implementation
BCM-Operation
Audits
Implementation of a BCMS according to BSI Standard 200-4 and/or ISO 22301
Implementation of a reactive BCMS according to BSI standard 200-4
BCMS gap analysis
Provision of an external business continuity manager
Planning and realisation of staff exercises
Planning and realisation of functional tests (cyber drill, partial and full simulations, system tests)
Internal audit according to ISO 22301
Penetration tests / Red Team
Compliance Check
Thread Concept
Social Engineering
Certifications
More technical Services
IT vulnerability scan
Phishing
Web Application Scan
Agile cyber security quick test
Microsoft 365 Security Audit
Red Teaming Assessments
SAP Pentests
Assume Breach
SAP-BTP
System and application audits
SAP Authorizations
Threat Modeling
Concept development in IT security
Product evaluation for security components
Architecture review for technical infrastructures
Social Engineering
Awareness Trainings
OSINT (Open Source Intelligence)
Accredited
In-house certificates
Technical audit services
Consulting Common Criteria
Legal requirements
External employees
DiGAV – our support services
Act for the Better Protection of Whistleblowers (HinSchG)
EU GDPR GAP Analysis and Recommended Measures
External Data Protection Officer
eIDAS 2
Conformity assessment and Certifications
Consulting
Trust Services, Electronic Identities, and the New Wallet for EU Businesses and Citizens
Conformity assessment and Certification of electronic ID Services (eID) and Trust Service Providers (TSP)
Services for Users of electronic ID (eID) and Trust Service Providers (TSP)
Accredited
In-house certificates
Certificate database
Certification in accordance with ISO 27001 by TÜV AUSTRIA Deutschland GmbH
DiGA / DiPA
Governance & Compliance
Trusted Blockchain
Trusted Application: Certification for Applications on SAP®-BTP-Platform
Certification in accordance with ISO 27001 on the basis of IT-Grundschutz
Certification of IT Applications “TÜV TRUST IT Trusted Application”
Certification of apps “TÜV TRUST IT Trusted App”
Certification of Cloud Services “TÜV TRUST IT Trusted Cloud Service”
Certification of Data Centers “TÜV TRUST IT Trusted Data Center”
Certification of IT services “TÜV TRUST IT Trusted Service”
Certification of software development processes “TÜV TRUST IT Trusted Development”
Certification of network components “TÜV TRUST IT Trusted Infrastructure”
Certification of network components “TÜV TRUST IT Trusted Infrastructure”
Testing and certification of IoT devices “TÜV TRUST IT Trusted IoT-Device”
Certification of “TÜV TRUST IT Trusted Usability”
Security-Know How
Close Security-Know How
Open Security-Know How
Trainings
Events
Webcasts
NIS-2 training for executive bodies
BSI IT-Grundschutz Practitioner
ISO/IEC 27001:2022 – Transition
certified isms-manager
certified risk-manager
certified isms-auditor
Special features in the introduction and operation of an ISMS in the energy sector
BCM-Practitioner
ISMS Experience Exchange
Test-Procedures Competences According to BSI Act § 8a
BCM Basics
eIDAS 2 Basic Training
eIDAS ETSI special topics
Training offer by TÜV AUSTRIA Deutschland GmbH
Working Group ISMS for Energy Suppliers
Webcast „SAP® BTP Cloud Security“
Webcasts “eIDAS” with special topics
Webcast „Live-Hacking | Spear Phishing and Malware.“
Live-Podcast „BCM – “But please, keep it simple“
Webcast „We secure digital health. IT-Security for DiGA and DiPA.“
Webcast: “Security in the Microsoft 365 Cloud – How to Protect Your Data.”
Webcast: “SAP® Cyber Attack – Current Threats in 2025”
Digital Roundtable on the NIS-2 Implementation Act: One-way communication is a thing of the past.
Webcast: Hacking and AI – Use Cases, Trends, and Criticism
Insights
Close Insights
Open Insights
News
Jobs
Contact
Flyout Menu
About Us
Team
Success Stories
RSB Logistic
Roche
Ecospeed
Centogene
Johanniter
Bosch
Siemens
Swiss Sign
ReadID
Services
Information Security Management
IS Implementation
Setting up an ISMS in accordance with ISO 27001
ISO 27001 development plan
Gap-analysis in accordance with ISO 27001
IT Security Act & KRITIS
KRITIS Umbrella Act
Intrusion Detection Systems (IDS)
Information Security according to the Energy Industry Act (EnWG)
IS Operations
Transition ISO/IEC 27001:2022 for energy system operators and operators of energy systems classified as critical infrastructure
External ISO/CISO
Supporting IT Auditing and IS Auditing
Freshmaker
BSI IT Baseline Protection
ISMS implementation in accordance with ISO 27001 based on IT-Grundschutz
Gap analysis ISO 27001 on the basis of IT-Grundschutz
NIS-2
DORA
TISAX
TISAX® Gap-Analysis
TISAX® Transition ISA 6
AI-Governance
SWIFT
OT-Security
Data Center Security
Data Center Certification
Audits
Examinations according to §8a (3) BSI Act
Internal ISMS audit / first party audit
Certifications
Accredited
In-house Certificates
BCM
BCM Implementation
Implementation of a BCMS according to BSI Standard 200-4 and/or ISO 22301
Implementation of a reactive BCMS according to BSI standard 200-4
BCMS gap analysis
BCM operation
Provision of an external business continuity manager
Planning and realisation of staff exercises
Planning and realisation of functional tests (cyber drill, partial and full simulations, system tests)
BCM Audits
Cyber Security
Penetrationtests / Red Team
IT vulnerability scan
Phishing
Web Application Scan
Agile cyber security quick test
Microsoft 365 Security Audit
Red Teaming Assessments
SAP Pentests
Assume Breach
Compliance Check
Technical Cloud-Assessments
System and application audits
SAP-Berechtigungen
Thread Concept
Threat Modeling
Concept development in IT security
Product evaluation for security components
Architecture review for technical infrastructures
Social Engineering
Social Engineering
Awareness Trainings
OSINT (Open Source Intelligence)
Certifications
Accredited
In-house Certificates
More technical Services
Technical audit services
Consulting Common Criteria
Data Privacy & Compliance
Legal Requirements
DiGAV – our support services
Act for the Better Protection of Whistleblowers (HinSchG)
EU GDPR GAP Analysis and Recommended Measures
external employees
eIDAS & Trust Services
Assessment and Certification
eIDAS Consulting
Certifications
Accredited
Certification in accordance with ISO 27001 by TÜV AUSTRIA Deutschland GmbH
Digital health and nursing applications (DiGA / DiPA)
In-house Certificates
Security-Know how
Trainings
BCM Basics
BCM-Practitioner
BSI IT-Grundschutz Practitioner
certified isms-auditor
certified isms-manager
certified risk-manager
eIDAS 2 Basic Training
eIDAS ETSI special topics
ISMS Experience Exchange
ISO/IEC 27001:2022 – Transition
NIS-2 training for executive bodies
Special features in the introduction and operation of an ISMS in the energy sector
Test-Procedures Competences According to BSI Act § 8a
Training offer by TÜV AUSTRIA Deutschland GmbH
Events
Working Group ISMS for Energy Suppliers
Webcasts
Digital Roundtable on the NIS-2 Implementation Act: One-way communication is a thing of the past.
Live-Podcast „BCM – “But please, keep it simple“
Webcast „Live-Hacking | Spear Phishing and Malware.“
Webcast „SAP® BTP Cloud Security“
Webcast „We secure digital health. IT-Security for DiGA and DiPA.“
Webcast: „SAP® Cyber Attack – Current Threats in 2025“
Webcast: „Security in the Microsoft 365 Cloud – How to Protect Your Data.“
Webcast: Hacking and AI – Use Cases, Trends, and Criticism
Webcasts “eIDAS” with special topics
Insights
News
Jobs
Contact
Contact
Home
Contact
Contact
"
*
" indicates required fields
X/Twitter
This field is for validation purposes and should be left unchanged.
Select salutation
Select salutation
Mr.
Mrs.
Academic title
Name
*
First
Last
Company
*
E-mail address
*
Phone
*
Message
Data privacy
*
I have read and accepted the
privacy policy
Search
Search