Select Page
Header_Office365Cloud_Backup_notebook
get up to 50.000 € sponsorship
BAYERN
DIGITALBONUS
Header_Office365Cloud_Backup_notebook
§
§
WE SUPPORT YOU
IS COMPLICATED?
DATA PROTECTION

Consulting

Risk management consulting

Risks are the bow waves of success - that's what the author Carl Amery wrote. If you want to recognize and take advantage of your opportunities, you must also manage your risks. We help you to use the potential of active and sustainable risk management for successful development.
TIP:
If your company is located in Bavaria, the government supports you with the Digitalbonus Bayern. Make sure you get up to 500.000 Euro subvention.

Risk management

Why with us?

Educated technicians, computer engineers and information manager
High range of know how in many industries
(healthcare, energy, production, automotive, public administration)
6 years experience in practical implementation
Synergy effects through consulting of several companies

Risk management

We support you!

The protection of the company from dangers and risks is a continous duty of the management. Das hierfür notwendige Risikomanagement analysiert, identifiziert und begegnet entsprechenden Gefahren mit angemessenen Maßnahmen.

IT
Emergency strategy

Information
security

Risk management

IT emergency strategy

In the conception and establishment of your IT emergency planning, we first identify together with you the business processes that are critical for your company and how they are depicted in IT.
We support you in evaluating business processes and determine their maximum downtime. Setting responsibilities and creating restart plans complete the process that brings significant benefits.
Complete analysis of business processes and their dependencies on IT
+ Consolidation, decrease of complexity
+ Dissolving of monopolies
+ Automatic check of contracts and SLAs
+ Also: Substitution of outages caused by holiday or illness
With the software INDART Professional used by Kutzschbach you get to a revision safe and financial accountant safe IT emergency strategy in eight steps.

Our partner

With the software INDART Professional used by Kutzschbach you get to a revision safe and financial accountant safe IT emergency strategy in eight steps.

Our partner

At the same time, the dynamic, database-based approach offers further added value, such as an always up-to-date emergency manual, which can be easily adapted and maintained accordingly quickly. In addition, the system has a comprehensive reporting system, so it can also be conveniently used as an operating manual. Intelligent failure managers will show you in one click what to do in case of a case and where the responsibilities lie. Your task is to evaluate and analyze and not type in data.
Even without tool-assisted work, our experts accompany you in this process and create the emergency planning you need with you.

Risk management

Information security management

In our increasingly digitized society, information is increasingly becoming critical success factors, on the availability of which the economically successful actions of a company depend to a considerable extent. Information thus represents values within an organization that need to be protected.
The establishment of an Information Security Management System (ISMS) is a systematic and sustainable approach to managing security structures in your company.
Information security system

ISO 27001

The ISO 27001 is a global approved standard for the proof of the security of information and IT infrastructures. The standard describes the requirements on the implementation and the documentation of a ISMS in a detailled way.
ISMS

With INDITOR ISO

We support you with the implementation of a ISMS software tool. In the context of our consulting we implement the ISMS Tool INDITOR ISO of CONTECHNET in your information security management system. The software enables the illustration and combination of all necessary company information with the requirements of a ISMS. So you can organize the information security in your company in a very efficient way and improve it continously.
YOUR ADVANTAGES:
+ Consistent and central controlled management system
+ Saving of costs and time
+ Better security and transparancy of the business processes
+ Better comparism of the performance
+ Effective monitoring and control of IT risks
+ Security proof of the organization for the legislator, customers, partners, insurances and providers
+ Supplement of the ISO 27001 Controls by BSI activities
+ Adopting of existing data in combination with the IT emergency strategy
ISMS

With INDITOR ISO

We support you in implementing an ISMS software tool. In the course of our consulting, we use the ISMS tool INDITOR ISO from Contechnet in the construction of your information security management system. The software enables the mapping and meaningful linking of essential business information with the requirements of an ISMS. As a user, you will be able to efficiently organize, maintain and continuously improve information security in your organization.
YOUR ADVANTAGES:
+ Consistent and central controlled management system
+ Saving of costs and time
+ Better security and transparancy of the business processes
+ Better comparism of the performance
+ Effective monitoring and control of IT risks
+ Security proof of the organization for the legislator, customers, partners, insurances and providers
+ Supplement of the ISO 27001 Controls by BSI activities
+ Adopting of existing data in combination with the IT emergency strategy

Our partner

Risk management

BSI basis protection

The basic IT protection developed by the Federal Office for Security in Information Technology (BSI) is a model of procedure for identifying hazards and implementing security measures in the field of IT for companies. The aim of basic IT protection is to achieve a medium, adequate and adequate level of protection for IT systems and the information processed with them.
We support you in the implementation of the basic IT protection according to BSI by using the software INDITOR BSI from CONTECHNET. The software simplifies the creation of IT security concepts and supports the procedure along the BSI standards 100-1 - 100-3 (coverage of the standard 100-4 - contingency planning by INDART Professional). By integrating the current BSI catalogues, INDITOR enables the development of the required minimum level of protection of information security as a comprehensive, subject-specific and above all practical solution.
In four steps you will achieve your aims:

Structure analysis

Analysis and visualization of the reliabilities of business processes, IT applications & information technology

modeling

Selection and Adaption of activities from the basis protection katalogues for the in the information group fixed aim objects

Basis security check

target-performance comparism of the implementation level of the recommended activities for the declaration of the current security level & the identification of improvement possibilities

Risk analysis

Basis for the establishment of security measures for tasks with a high or very high protection demand

Your link to our

IT Consulting

Our team is looking forward to your request! Just leave us a message so that we can contact you
Tel.: 09081 2503 450
Mail: consulting@kutzschbach.de

Ask our team

“I support the IT consulting team in topics like IT emergency strategies and risk management. I look forward to provide our customers solution-oriented advice and to look after them in the best possible way."

Jochen Preiß
Data protection & risk management
Kutzschbach Electronic

“The trend of the digitalization is changing the economy and companies. This trend also creates new challenges for your IT, the solution of which requires a fundamental consideration. As a consultant, I will be happy to answer your questions and support you in developing solutions."

Patrick Kandert
Consultant
Kutzschbach Electronic