Best practice approach

Establish an ISMS according to NIS-2

   Benefit from 20+ years of experience

   Become compliant with NIS-2 efficiently

   Helping you to help yourself

Talk to our experts

500+ customers place their trust in us – from startups to large companies

The steps to your ISMS according to NIS-2

1. NIS-2 Gap Analysis

NIS-2 Gap Analysis

The first step is an NIS-2 gap analysis. Through a mixture of document review and interview sessions with the relevant departments, our experienced consultants assess and evaluate the status of your current implementation based on the requirements of NIS-2.

This NIS-2 gap analysis gives you and us a clear picture and enables us to realistically estimate the implementation effort, clearly structure the project and define the necessary work packages.

If you have already carried out a gap analysis, we will work with this and will not carry it out again.

  Where are you currently?

5. Implement measures

Implement measures

Implement measures
Now it's time to implement the defined measures. In this phase, we provide very targeted coaching and also support you as required in the event of any resource bottlenecks. It is important to us to prepare you or a member of your team in the best possible way for the tasks of an Information Security Officer.

During implementation, we attach great importance to practicable solutions, i.e. to ensuring that the measures

  • contribute to achieving the desired level of security,
  • are economical and feasible and
  • meet the requirements of NIS-2.

  Eliminate deficits and implement requirements

6. Internal audit

Internal audit

In order to check the effectiveness of the established ISMS, internal ISMS audits should be carried out regularly - and rightly so, as internal audits put the effectiveness of the established ISMS to the test, among other things.

Added value of internal ISMS audits:

  • Statement on the effectiveness and maturity level of the ISMS.
  • Technical and organizational weaknesses can be identified in a structured manner through audits

  Let's see how good the work is that we have done so far

 

Want our help to help yourself?

Let's get to know each other in a web meeting and talk about your situation and goals. We will show you how we have helped in similar customer situations.

Yes, let's talk

Other ISMS services that might interest you

Other ISMS services that might interest you

ISO 27001 Gap Analysis Preview

ISO 27001 gap analysis: Assess the maturity of your ISMS, uncover gaps & improve compliance. Get your evaluation from our experts now!

Read more
Establishing a BCMS Preview

Protect your company with tailor-made business continuity management: avoid IT failures, minimize risks, secure core processes. Request support now!

Read more
External Information Security Officer (ISO) Preview

External ISO – experienced, well-proven, immediately available. Efficient ISMS support for IT security & data protection. Get support now!

Read more