the implementation of information security management systems according to ISO 27001 based on Instant 27001
of information security assessments at our customers as well as at their service providers (supplier audits)
for information security, ICS and individual audits in the information management environment
of vulnerability scans and penetration tests for small and large web applications as well as IT infrastructures
of phishing campaigns to train employees in the conscious and secure use of e-mails