Process completed. Problem unresolved.

The wiper blades on my leased vehicle were worn out.The car had been sitting for six months before I took delivery—low mileage,visibility is now limited. Lease includes maintenance & wear and tear; wiper blades are explicitly covered. So I submitted a request to the authorized service center.Response: Cost coverage denied. Reason: First registration was only […]
Flying blind rarely feels good

A few weeks ago, I attended a blind dinner.A full menu – served in complete darkness. Everything was there: food, drinks, cutlery, service.Just not visible. Suddenly, completely new questions arose:How do I drink without knocking the glass over?How do I eat without spilling dinner on my shirt? It was an exciting experience and a very […]
Why information security is not an IT project

“IT takes care of security.”One of the most common and dangerous misconceptions in companies. Information security is not an isolated IT project.It is a company-wide management issue. So who is actually responsible?Information security protects the confidentiality, integrity, and availability of information throughout the business, not just in IT. While IT orchestrates data processing, the responsibility […]
NIS-2 meets GDPR: Is one notification sufficient, or is the next liability trap looming?

Recently at an NIS 2 workshop with a client’s management team.Topic: Reporting requirements for IT security incidents. The central BSI portal for reporting security incidents has recently been launched – which is good and right. But then came the crucial question from C-level: What happens if an IT security incident also affects personal data? Is […]
The wheat and the chaff: The two types of InfoSec advertising promises

In recent weeks, I have heard the same thing repeatedly in conversations with customers: The industry surrounding NIS-2 and ISO 27001 is currently a gold mine, and many are acting accordingly. The general sentiment can be summarized in two extremes: Extreme 1: The certificate pushers“ISO 27001 and NIS-2 in 3 weeks, free of charge. Everything […]
“I’ll do the rest with ChatGPT.” Why an ISMS is not a copy-paste project

About a year ago, a prospective customer said to me:“You know, Mr. Neeff, everything we need for our ISO 27001 ISMS documentation is now available for free on the internet. And I’ll do the rest with ChatGPT.” I love statements like that because I know exactly how much substance there is behind them. Namely, NONE. […]
Information security does not begin with ISO 27001, but with honesty.

Many believe that the core of effective information security lies in a particularly “good” or “beautiful” implementation of ISO 27001 or NIS-2. But the real success factor is something else: an honest assessment of the current situation. What does this mean in concrete terms? This is precisely where the wheat is separated from the chaff.True […]
Security risk board of directors: When ignorance becomes a real vulnerability

As the threat escalates, a publicly traded corporation continues to cut corners on IT security, relying on hope rather than defense. The CISO? No influence. No budget. No team. Now the few employees are sick, and no one cares.The executive suite? Looking the other way. Years of overload, zero recognition, no opportunities for development, and […]
Excel Dieter, PowerPoint Joe, and the management system chaos

Anyone involved in setting up and operating management systems—such as for information security in accordance with ISO 27001 (ISMS) or quality management in accordance with ISO 9001—is all too familiar with the scenario: Pages and pages of PowerPoint slides, huge Excel files with complex formulas, and dozens of Word documents often form the basis of […]
AI, copy & paste, and the end of genuine diligence?

I receive many emails and LinkedIn in-mails—mostly from people who promise me the moon. They claim to have “cracked the LinkedIn code” and can help me gain lots and lots of new customer relationships in no time. I just smile wearily at these messages now.But last week, I finally lost my temper. One sender was […]