LEITWERK Consulting as IT project management consultancy for IT security and ISO 27001

Information security (ISO 27001 & TISAX)

Information security is often abstract. Controlling and managing risks can be a complex endeavour. We develop customised solutions and want our customers to fully understand our measures for ensuring information security and be able to use them in their day-to-day business.

The value of information is often underestimated in companies. At the same time, information security is often reduced to pure information technology (IT security) instead of including every type of information, whether in electronic form, printed on paper or as a spoken word.

An information security system (ISMS) in accordance with ISO 27001 defines procedures, rules and tools with which information security can be controlled, monitored, ensured and continuously optimised - in short: with the help of an ISMS, the protection of information can become an integral part of your company processes.

Our performance promise

  • //

    An up-to-date overview of your process and IT landscape forms the basis for understanding where you stand and which strategic and sensible steps need to be taken for a functioning ISMS.

  • //

    We support you in introducing the necessary processes, organisational structure and legally required documentation for an information security management system (ISMS) in accordance with ISO 27001.

  • //

    Our expertise in information technology as well as project and process management - combined with the relevant industry experience of our consultants - make LEITWERK a strong partner for ISMS projects.

The security of your information is a key factor in your business success. We provide a customised information security management system
Lilian Stecher
Senior Consultant

Our approach
The building blocks for the introduction of an information security system (ISMS)

1. Phase 06

ISMS intensive workshop

Project examples

Implementation of an ISMS in accordance with ISO 27001 in the area of service provision

Scope of commission

Our client urgently needed support to provide proof of existing information security and to ensure a sustainable build-up of expertise in this area. As part of the assignment, two experienced LEITWERK consultants supported the client's 7-person team.

Initial situation

Many companies require proof of information security in the form of an ISO 27001 certificate to protect the information they use and the services they provide. For this reason, a project for the implementation of an ISMS was initiated on the basis of the company's specifications, with which it will also be possible to react quickly and flexibly to changing security requirements in the future.

Solution approach

In the first step, all existing documentation, processes and tools were intensively screened using a GAP analysis. This step also included a structural analysis as well as initial modelling and basic security checks. We then focussed on designing an ISMS (Information Security Management System) and determining the protection requirements. Throughout the project, employee empowerment was considered an essential component. In particular, this included teaching communication skills in order to involve all stakeholders at an early stage in the future.

Results

The targeted combination of project, process management and IT expertise led to the successful DIN ISO 27001 certification of the ISMS that was introduced. Standardised security processes also make it possible to react flexibly to all security-relevant events. All stakeholders are aware of the importance of the ISMS and information security has been anchored in the company's objectives as an important building block for the future.

Your advantages
...if you decide in favour of an ISMS according to ISO 27001 or TISAX with LEITWERK

  • Icon: Holistic approach

    Holistic approach

    Holistic approach that combines technical security mechanisms with organisational measures, making security an integral part of business processes. Our experience ensures that your ISMS is geared towards your business processes.

  • Icon ISMS as a competitive factor

    ISMS as a competitive factor

    Ensuring compliance with legal and contractual requirements promotes a positive internal and external image.

  • Icon Structure

    Structure

    With the help of an ISMS, we take a look at the current security level of IT systems and business processes. We uncover weak points, provide tips on how to close gaps and train your employees in handling sensitive data.

  • Icon Basis for decisions on the use of funds

    Basis for decisions on the use of funds

    The results of the risk assessment can be used as a basis for decision-making. In this way, the actual investment requirements can be determined and incorrect use of funds can be avoided.

  • Icon Transparency about IT systems and risks

    Transparency about IT systems and risks

    By setting up an ISMS, you gain transparency about your IT system network, the company processes and the resulting risks. An ISMS provides the framework for consciously dealing with risks and implementation strategies for reducing your risk potential.

  • Icon Security awareness throughout the organisation

    Security awareness throughout the organisation

    By establishing an ISMS, a generally increased and regular security awareness is achieved throughout the entire organisation.

Interested? We would be happy to send you detailed information about our solution.
Contact us!
Sebastian Linder - LEITWERK Consulting
Your contact person
Sebastian Linder
+49 89 189 235 96
...or write us via our contact form
Contact us!

More from LEITWERK
You coud also be interested in this

  • Icon Change management

    Change management

  • Icon integrated management systems

    Establishment and further development of integrated management systems

Search