Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Hall 7 / Booth Number 7-234

Information Security Management System (ISMS)

Key Facts

  • Establishment and maintenance of an ISMS
  • Consulting services for ISO 27001 and "IT-Grundschutz" (BSI)
  • Emergency concepts and recovery concepts

Product Description

An Information Security Management System (ISMS) is used to plan, implement and maintain information security within an organization. Similar to other management systems, such as quality management, it is a collection of policies and procedures that can be used to manage and control security. As a rule, predefined standards are used as the basis, such as the DIN-ISO standard 27001 or the "IT-Grundschutz" (basic IT security guidelines) defined by the Federal Office for Information Security (BSI), especially for public authorities and public institutions. The aim of information security management is to ensure information security on a uniform and verifiable basis and to continuously optimize it. The ISMS is therefore a valuable tool both for the proof of good IT governance and compliance as well as for improving your own level of protection. Due to the complexity of the standards, mechanisms and technologies used, the involvement of experienced specialists pays off when setting up and updating an ISMS. We offer you: • Establishment and maintenance of an ISMS • Consulting services for ISO 27001 and "IT-Grundschutz" (BSI) • Emergency concepts and recovery concepts • Real-time quick-check of roles and permissions
... read more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.