AIT also offers its broad expertise in cyber security as an individual consulting service. Together with our customers, we determine the initial situation in which they find themselves and discuss the current pain points and requirements for the future. In the preliminary stages of the consulting project, we define well-structured and manageable modules with a clear focus on results in order to give our clients the opportunity for independent and sustainable further development within the company. The further development of our customers is important to us, as this is an additional step towards a cyber secure society.
In detail, AIT offers opportunities for cooperation in the following topics:
- IT process management, business process re-engineering
Processes are the operational heart of every company. The interaction of business processes with IT makes a significant contribution to the success of a company. IT as an enabler has to be realized, therefore we try to design our customers' processes in such a way that they run properly, as error-free as possible, with low risk and in as "lean" a way as possible. This also includes the IT applications and databases involved, which in turn must interact smoothly with the IT processes. We use recognized frameworks such as COBIT and ITIL.
- Information Security Management System (ISMS)
As part of our ISO/IEC 27001 consulting services, we support the introduction of an information security management system (ISMS) into organizations. Our customers receive a detailed overview of the security-relevant ICT services in their company, which must be protected with suitable measures. If necessary, we also support our customers in the elimination of defects that have been identified. Depending on the requirements, this consulting service is geared both as preparation for certification maturity and a corresponding sustainable quality assurance, as well as selectively and in a targeted manner to the fundamental improvement of information security in specific areas.
- Business Continuity Management (BCM)
In an emergency, our customers still want their IT to support their business processes. On the one hand, companies have to cope with the crisis, and on the other hand, systems and processes have to be appropriately prepared so that they can be applied if the need arises. This increases the resilience of businesses and makes them less vulnerable to cyber attacks or incidents. We apply ISO 22301 or BSI standards for this purpose in order to develop a viable technical and organizational emergency concept with our customers.
- - IT strategy development
We help our customers to optimally align their IT with their business processes and to adapt their IT strategy to the given circumstances. Both the management system and the IT processes of our customers must follow basic guidelines in order to provide optimal support for their business. The strategy should be realistic for the next 3-5 years and sufficiently flexible to allow for short and medium term priorities to be set. Our customers develop this strategy with our recognized experts with their knowledge of cybersecurity from business and scientific practice.
- IT audits
If IT audits are to be carried out in a cooperative partnership with practical relevance, the AIT experts help with this task. We define the scope with our customers and try to work out possible potential for improvements based on their needs. On the basis of a report, we will prioritize these and thus give our customers the opportunity to calmly and sustainably make improvements in the subsequent months. We use recognized frameworks such as COBIT, ITIL or ISO/IEC 27001, among others, and can also take NIS-specific aspects into account
- Technical perspective for the implementation of data protection requirements in IT
AIT supports companies of all sizes - and SMEs in particular - in implementing the EU’s General Data Protection Regulation (GDPR) and the national data protection legislation (DSG) with our four-stage consulting concept. This can also be tailored to the individual needs of the customer in order to achieve resource optimisation.