CSO GmbH

CSO GmbH

CSO GmbH provide specialist consultancy services in the area of IT security.

Project Management
- Management and controlling of IT security projects, e.g. Demand and vulnerability analysis
- Technical and organizational management of integration projects

Information Security Management Systems
- Planning and implementation of information security systems
- Conducting audits according to national and international standards (for example ISO 27001, BSI-Grundschutz, PCI-DSS)
- Best practice advice (according to ITIL v3)

Governance, Risk and Compliance
- Risk analysis
- Legally compliant IT operation

IT security as a process
- Organizational and system security
- Security Information and Event Monitoring
- Vulnerability assessments

Contact Information

Categories:
Consulting Services

Directory of Suppliers

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ARM

ARM

ARM provides a range of IP and software technologies to enable secure solutions using ARM Cortex processors. Applications include IoT devices.

Westermo Network Technologies

Westermo Network Technologies

Westermo designs and manufactures robust, resilient and secure data communications products for mission-critical industrial systems.

IdenTrust

IdenTrust

IdenTrust enables organizations to effectively manage the risks associated with identity authentication.

Simeio Solutions

Simeio Solutions

Simeio is a complete Identity and Access Management (IAM) solution provider that engages securely with anyone, anywhere, anytime.

TrulyProtect

TrulyProtect

TrulyProtect provides a suite of Code Security Tools that protect creators of software against Reverse Engineering, Modification and Theft of Algorithmic and other coded-IP.

Unbotify

Unbotify

Unbotify's mission is to provide a best in class solution to one of the major problems of web application security today - detecting malicious bots.

Swiss Cyber Storm

Swiss Cyber Storm

Swiss Cyber Storm is a non profit organization hosting the international Swiss Cyber Storm Conference and running the Swiss part of the European Cyber Security Challenges.

Naukrigulf

Naukrigulf

Naukrigulf.com is one of the fastest growing job sites in the Gulf, with thousands of registered job seekers and a robust CV database across many sectors, including cybersecurity.

Maven Technologies

Maven Technologies

Maven Technologies specialize in secure data destruction, electronics recycling, asset management, and highly detailed reporting.