


Your Risk Management Consulting



Risks are not a product of modern times
They’ve existed since humans could think. The only thing that has changed is how we deal with them. Nowadays a risk analysis can be carried out in different ways and thus be better understood. As a result, risks can be avoided, mitigated, transferred or accepted.
The evaluation of risks is the prerequisite for successful security management. As part of our consulting services, we carry out a risk analysis and give you concrete and individual recommendations for action to reduce risk. Trigonum’s risk management consulting is more than just a status analysis.
Risk Analysis by Trigonum Risk Management Consulting



Within the scope of our consulting services, we help you to uncover the risks in your company. Only a few companies are aware of the risks associated with IT and understand how to deal with them.
On the basis of our many years of experience, we offer you methodical support through best practices within IT risk management. After identifying IT risks, we deliver concrete solutions for improving your IT security based on ISO 27001. We put you in a position to make the right decisions so that you can take the step from risk identification to risk treatment and avoidance.



Tool-supported status determination with the Trigonum ISMS Framework
The basis for recording the implementation progress of the individual measures is a tool-supported procedure. The data is stored in SQL databases and the reporting tools used provide graphical, web-based reports for a transparent and clear overview.
Our risk management consulting – your benefit:
- Consistent methodical support in carrying out analyses for holistic risk assessment
- Comprehensive risk management on the basis of best practices
- Transparency in the recording and consideration of company values
- flexibility in recording and viewing buisness values
- Transparency with regard to the evaluation of the overall risk status
- Efficient planning of measures
- Easier monitoring of the implementation of measures
- Efficient use of resources by security managers and risk managers
- mapping of ISO 27001 or BSI IT basic protection requirements



Your Risk Management Consulting



Risks are not a product of modern times
They’ve existed since humans could think. The only thing that has changed is how we deal with them. Nowadays a risk analysis can be carried out in different ways and thus be better understood. As a result, risks can be avoided, mitigated, transferred or accepted.
The evaluation of risks is the prerequisite for successful security management. As part of our consulting services, we carry out a risk analysis and give you concrete and individual recommendations for action to reduce risk. Trigonum’s risk management consulting is more than just a status analysis.



Risk Analysis by Trigonum Risk Management Consulting
Within the scope of our consulting services, we help you to uncover the risks in your company. Only a few companies are aware of the risks associated with IT and understand how to deal with them.
On the basis of our many years of experience, we offer you methodical support through best practices within IT risk management. After identifying IT risks, we deliver concrete solutions for improving your IT security based on ISO 27001. We put you in a position to make the right decisions so that you can take the step from risk identification to risk treatment and avoidance.



Tool-supported status determination with the Trigonum ISMS Framework
The basis for recording the implementation progress of the individual measures is a tool-supported procedure. The data is stored in SQL databases and the reporting tools used provide graphical, web-based reports for a transparent and clear overview.
Our risk management consulting – your benefit:
- Consistent methodical support in carrying out analyses for holistic risk assessment
- Comprehensive risk management on the basis of best practices
- Transparency in the recording and consideration of company values
- flexibility in recording and viewing buisness values
- Transparency with regard to the evaluation of the overall risk status
- Efficient planning of measures
- Easier monitoring of the implementation of measures
- Efficient use of resources by security managers and risk managers
- mapping of ISO 27001 or BSI IT basic protection requirements


Related Services
The information security requirements of customers, legislators, banks and insurance companies are constantly increasing. More and more customers demand concrete proof from their suppliers that an efficient information security management system has been established. In addition, companies are obliged to ensure the proper processing of personal data. Both sectors should not be considered in isolation, but together in order to achieve maximum synergies.
The legislator obliges the operators of critical infrastructures to adequately secure their IT according to the state of the art and to meet the IT security standards. The IT Security Act passed in 2015 requires operators of critical infrastructures to review security every two years. The Federal Office for Security and Information Technology (BSI) must also be notified by KRITIS operators of all significant incidents in the area of IT security.