Identify vulnerabilities before others do

Full-Service
Cyber Audit

We've given this some thought. Checks and audits are everywhere, but often insufficient. For us, a complete cybersecurity assessment also means considering insurability and verifying compliance with legal requirements such as NIS2.

Your Check-Up Examination

You want to know:

Cyberaudit logo
Where are my IT and OT vulnerabilities?

What do we check? Data Handling, Technical Security, Organizational Security, Detection & Response, Cashless Payment, Continuity Management, Operational Technology, and External Service Provider.

Cyberaudit logo
Which NIS2 requirements must I implement?

The NIS2 directive increases requirements for many companies. With our check, we also examine which requirements are relevant for your company. After the cyber audit, we provide a roadmap to NIS2 readiness.

Cyberaudit logo
Am I currently insurable?

Insurability with a cyber policy is a good indicator of strong cyber resilience. Insurers' requirements are constantly increasing, making assessment against these requirements very purposeful. If there's interest in insurance, we can approach insurers with this basis.

itsa_2023_Philipp_Skucha

What's included?

Your Cyber Audit
Your Output

Sounds great, but what's included? Our setup for a comprehensive cyber resilience assessment looks like this:

  • Audit dialogue with Security Consultant
  • External Security Scan
  • Detailed report including Management Summary and recommendations
  • Roadmap for potentially necessary projects
  • Optional: Analysis of potential insurers including insurance offer
itsa_2023_Philipp_Skucha

What does an External Security Scan do?

Quick Identification
Critical Areas

We scan externally accessible systems for vulnerabilities. This includes checking open ports, domains, and the Dark Web to provide a comprehensive analysis. This external scan is an integral part of the cyber audit and should ideally be performed regularly to sustainably improve the rating.

  • Verification of all registered domains for vulnerabilities
  • Analysis of external IT infrastructure according to BSI standards and recommendations
  • Dark Web scan to identify suspicious data sets

Download Sample Report

The Cyber Audit -
The New Benchmark

To understand how comprehensive a cyber audit can be, the best way is to view a sample report. We provide this here and are of course available for any questions.

  • 153 Test Parameters
  • 10 Categories
  • 1 Hour Interview
Personal

YOUR CONTACT

Jaen-Ray

Account Executive