Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.


Hall 7A / Booth Number 7A-516

CyberSecurity Check


Consulting IT security Awareness Data protection, data security Security management Network security

Key Facts

  • Practice-oriented approach for the entire company
  • Determination of cyber security exposure
  • Non-invasive testing and conformity to standards

Product Description

As an information security officer (ISO), data protection officer (DPO) or IT manager, would you like to take a closer look at your organization's security level? That's why we developed the Cyber Security Check. Materna's Cyber Security Check is a procedure to get an overview of the status of cyber security in an organization. The check is standardized, based on best practices and takes into account the BSI and ISACA guidelines and the ISO 27001 assessment. The check initially includes a risk assessment and a review of relevant documents. As part of the on-site assessment, IT systems are checked and any additional documents are reviewed. This is how our accredited consultants determine the level of cyber security of your organization. The cyber security check ends with concrete recommendations on how responsible parties can eliminate identified security deficiencies. Materna provides an assessment report that includes the following:
  • Framework data including a description of the examined organization and its IT
  • Management Summary including an assessment of the threat situation (cyber security exposure) a
  • Detailed Assessment (detailed presentation of the identified deficiencies, their evaluation and recommendations on how to remedy them)
... read more

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.