
Identify vulnerabilities before others do
Full-Service
Cyber Audit
We've given this some thought. Checks and audits are everywhere, but often insufficient. For us, a complete cybersecurity assessment also means considering insurability and verifying compliance with legal requirements such as NIS2.
Your Check-Up Examination
You want to know:

Where are my IT and OT vulnerabilities?
What do we check? Data Handling, Technical Security, Organizational Security, Detection & Response, Cashless Payment, Continuity Management, Operational Technology, and External Service Provider.

Which NIS2 requirements must I implement?
The NIS2 directive increases requirements for many companies. With our check, we also examine which requirements are relevant for your company. After the cyber audit, we provide a roadmap to NIS2 readiness.

What's included?
Your Cyber Audit
Your Output
Sounds great, but what's included? Our setup for a comprehensive cyber resilience assessment looks like this:
- Audit dialogue with Security Consultant
- External Security Scan
- Detailed report including Management Summary and recommendations
- Roadmap for potentially necessary projects
- Optional: Analysis of potential insurers including insurance offer

What does an External Security Scan do?
Critical Areas
We scan externally accessible systems for vulnerabilities. This includes checking open ports, domains, and the Dark Web to provide a comprehensive analysis. This external scan is an integral part of the cyber audit and should ideally be performed regularly to sustainably improve the rating.
- Verification of all registered domains for vulnerabilities
- Analysis of external IT infrastructure according to BSI standards and recommendations
- Dark Web scan to identify suspicious data sets
Download Sample Report
The New Benchmark
To understand how comprehensive a cyber audit can be, the best way is to view a sample report. We provide this here and are of course available for any questions.
- 153 Test Parameters
- 10 Categories
- 1 Hour Interview
