Skip to content
Trigonum Logo
  • companyCompany
    • Trigonum partners working togetherManagement
    • Icon ideaPhilosophy
    • Icon GoalTarget Groups – Branches
    • Icon Ideas exchangeConsulting Approach
    • Icon StärkeOur Competences
    • Ziel erreichtReference Projects
    • Icon JobCareer
  • Icon securityInformation Security
    • ChecklistQuick Check Information Security
    • Automobil TISAXVDA Information Security
    • CameraInformation Security Concept
    • Icon attentionRisk Management Consulting
    • NotebookISMS
    • Icon IT ConsultantInformation Security Officer
    • ISO 27001ISO 27001 Certification
    • Icon ISMS safeISMS Critical Infrastructures
    • Cloud securetySafely in the Cloud
  • law, GDPR, DSGVOData Privacy
    • ChecklistExternal Data Privacy Check
    • Notes Requirements ManagementData Privacy Documentation
    • Icon privacy policyData Privacy Concept
    • GDPR, DSGVOGDPR
    • Dokumentation VerarbeitungData Processing Register
    • Icon IT ConsultantTOM Check
    • data protectionExternal Data Privacy Officer
    • instructionEmployee Sensitisation
    • FormContract Processing
    • Icon PINCombined Security
  • Ihre Spezialisten für InformationssicherheitProject Management
    • Requirements Management
    • Icon MeetingProject Management & Consulting
    • Icon PortfolioPortfoliomanagement
    • recordsMethods & Standards
    • instructionProject Management Training
  • Icon SharePointSharePoint
    • NotebookISMS Portal
      • recordsDocument Management
      • magnifier, flawAudit Management
      • Asset Register
      • Processing DescriptionRecords of processing activities
      • FunktionSharePoint Workflows
      • Icon AchtungRisk Management
      • Icon privacy policyPrivacy Impact Assessment
      • Supplier Management
      • Contract management
      • Measure Management
      • DashboardReporting / KPIs / Dashboards
      • Process Management
      • Project planProject Management
    • FunctionQM Portal
    • ChecklistRevision Tool
    • Dokumentation VerarbeitungRecords of processing activities
    • ICON ToolsEmergency and fault management
  • schoolTraining
    • instructionClassroom Training
    • Icon eLearningelearning Portal
  • Deutsch
  • companyEnterprise
    • Trigonum partners working togetherManagement
    • Icon ideaPhilosophy
    • Icon GoalTarget Groups & Branches
    • Consulting approach
    • Icon strongOur competences
    • achieveReference projects
    • Icon JobCareer
  • Icon securityInformation Security
    • ChecklistQuick Check Information Security
    • Icon AutoVDA Information Security Assessment
    • CameraInformation Security Concept
    • Icon attentionRisk Management Consulting
    • NotebookISMS
    • Icon IT ConsultantInformation Security Officer
    • ISO 27001ISO 27001 Certification
    • ISMS critical infrastructures
    • Cloud securetySafely in the Cloud
  • DSGVO & BDSG neuData Privacy
    • ChecklistExternal Data Privacy Check
    • letterData Privacy Documentation
    • data protectionData Privacy Concept
    • European Union flagGDPR
    • Processing DescriptionData Processing Register
    • ConstulantTOM Check
    • Icon DS ExperteExternal Data Privacy Officer
    • instructionEmployee Sensitisation
    • data protectionContract Processing
    • Icon PINCombined Security
  • planProject Management
    • DashboardRequirements Management & IT Governance
    • Project Management Training MeetingProject Management & Consulting
    • Icon PortfolioPortfoliomanagement
    • Icon DocumentationProject Management Methods & Standards
    • instructionProject Management Training
  • Icon SharePointSharePoint
    • ISMS Portal
    • Icon TeamsQM Portal
    • ChecklistThe revision tool
    • ICON toolsEmergency and fault management
    • Icon DocumentationDocument Management
    • magnifier, flawAudit Management
    • Asset Register
    • Processing DescriptionRecords of processing activities
    • Icon privacy policyPrivacy Impact Assessment
    • Contract management
    • Measure Management
  • schoolTraining
    • Icon SchulungClassroom Training
    • graduateelearning Portal
  • Deutsch
  • Digitalisierung
  • SharePoint Workflows
  • Collaboration (Teams)
  • Prozessmanagement
Information security conceptschmidtkev2020-01-21T13:40:12+01:00
Notebook

Information security concept

Informationssicherheitskonzept

A customized information security concept for your company

Trigonum Consulting develops an individual information security concept for your company – another step to ISMS

The creation of an information security concept is the first step in the implementation of the security directive within the framework of the Information Security Management System (ISMS). At your request, we will create an individual information security concept for you that meets the needs of your buisness and in which all legal requirements are taken into account.

Information security concept

Nowadays, security is assigned a central role. Not only because managers are personally responsible for security, or because the problem of white-collar crime due to data theft is getting bigger and bigger, but also because critical business processes and the market business live in enormous dependence on a highly available and secure IT infrastructure. However, information security is much more than firewalls and virus programs. It includes above all organizational, infrastructural and personnel aspects that should be considered in an information security concept.

Your benefit from our individual information security concept

ISMS document structure
  • Reduced effort and project duration through tool-supported methodology and the use of tried and tested templates for documentation
  • Individual process plans and work orders for targeted implementation
  • Dashboard with traffic light graphics for continuous presentation of the possible need for action
  • Orientation towards the recognised standards BSI-basic protection and ISO 27001
  • The basis for later certification according to these standards
  • Competence transfer by specialists with operational responsibility and experience in the relevant subject areas
Notebook

Information security concept

Informationssicherheitskonzept

A customized information security concept for your company

Trigonum Consulting develops an individual information security concept for your company – another step to ISMS

The creation of an information security concept is the first step in the implementation of the security directive within the framework of the Information Security Management System (ISMS). At your request, we will create an individual information security concept for you that meets the needs of your buisness and in which all legal requirements are taken into account.

Information security concept

Nowadays, security is assigned a central role. Not only because managers are personally responsible for security, or because the problem of white-collar crime due to data theft is getting bigger and bigger, but also because critical business processes and the market business live in enormous dependence on a highly available and secure IT infrastructure. However, information security is much more than firewalls and virus programs. It includes above all organizational, infrastructural and personnel aspects that should be considered in an information security concept.

ISMS document structure

Your benefit from our individual information security concept

  • Reduced effort and project duration through tool-supported methodology and the use of tried and tested templates for documentation
  • Individual process plans and work orders for targeted implementation
  • Dashboard with traffic light graphics for continuous presentation of the possible need for action
  • Orientation towards the recognised standards BSI-basic protection and ISO 27001
  • The basis for later certification according to these standards
  • Competence transfer by specialists with operational responsibility and experience in the relevant subject areas
Icon Meeting

Our approach

1. Status determination

Icon compass for orientation

through a practice-oriented safety check, which is based on internationally recognised standards and leads to a differentiated documentation of the existing safety conditions.

2. Risk Analysis

Risikoanalyse mit Hilfe unserer Risikomanagement Beratung

by evaluating the initial situation and determining the risks existing for the business. In addition, the acute need for action is pointed out here.

3. Process planning

Project plan

with development of company-specific measures taking into account existing documentation.

4. Define work packages

Methods

with definition of the business-related documentation concept, allocation of responsibilities and development of individual work orders (with detailed descriptions) in which the requirements of safety standards and laws are taken into account.

5. Implementation

cogwheel

with content development of the relevant documentation, concepts and processes using Trigonum templates as well as implementation of the defined security concepts and measures, project management, reporting and control of the implementation.

Icon Documentation

Information security concept

Privacy policy

Additional benefit through Best of Breed in security standards

Through experienced auditors Trigonum has the competence in both decisive safety standards, so that a very needs-oriented methodical orientation exists. Depending on the task, the procedure can be carried out either from the point of view of the BSI-basic protection with a multitude of concrete measures or from the point of view of ISO 27001 with greater degrees of freedom with less concrete implementation proposals.

Fokus auf die Prozesse

Focus on practicable procedures

The information security concept contains both a concrete and a very practicable basis – unlike the usual information security concepts, which after analysis are limited to general descriptions of measures and do not offer any usable instruments for implementation.

IT security and privacy

Our information security concept as a convincing alternative to conventional concepts

Classical concepts for the systematic and sustainable development of security structures often fail, however, because they are not customized enough to the practical conditions of companies. In particular, they do not provide the various employees within the organisation with enough concrete support and do not contain sufficient methods to make the multi-faceted safety conditions continuously transparent and to be able to point out possible need for action.

cogwheel

Related Products

Monitor Project overview dashboard

Projektportfolio-Management

If several projects run parallel, the balance between the projects competing for resources is a separate management task. The introduction of project portfolio management is intended to provide a transparent overview of project requirements and ongoing projects and to make the individual IT projects comparable.

Read More
IT Management Consulting

Requirements management

In most cases, corporate and IT strategies are only slightly interlinked. A study by Trigonum has shown that the main reason for this is the lack of organizational structures for close cooperation between business and information technology. Only one in four IT managers describes them as functioning, all others do not give good marks to the organisational conditions for IT governance, because IT strategies are derived either only to a small extent or not at all from market-related corporate strategies.

Read More

Methods & Standards

Zur erfolgreichen Abwicklung von Projekten sind einheitliche Prozesse, Standards, Formulare und Methoden notwendig. Einheitliche Projektmanagement Standards schaffen Transparenz im Unternehmen und sind die Basis für gemeinsames Projektmanagement Verständnis. Unsere Projektmanagement Experten bieten Ihnen methodische Beratung von Projekten und unterstützen den Projektleiter und das ganze Team in der Auswahl und Anwendung der geeigneten Methoden.

Read More
Imprint  |  Privacy Policy | Downloads
Copyright by Trigonum GmbH | All Rights Reserved
  •  

Go to Top