condignum Services
Information security
The path to effective security management
Risk management
Risk management - how to stay prepared for anything!
Implementation support for NIS2 / KRITIS
Cybersecurity for operators of critical infrastructures
NIS2 Readiness Check
Preparation for NIS2 compliance
NIS inspection by qualified body
Proof of NIS compliance
Cyber Trust Label Austria
The Austrian seal of approval for cyber security
CISO as a Service
Expertise and a helping hand for cyber security
Information security
The path to effective security management
Data is often referred to as the gold of the digital age. Because of this significance that it is important to implement reliable controls to ensure the essential protection goals of information security - confidentiality, integrity and availability. ISO/IEC 27001 is one of the most recognised standards in the field of information security and defines the framework for a holistic approach to security with the implementation of an ISMS (Information Security Management System).
As condignum, we support you both in setting up certifiable information security management systems (ISMS) and in reviewing and optimising existing systems in accordance with ISO/IEC 27001.
Risk management
Risk management - how to stay prepared for anything!
The number and complexity of cyber attacks is constantly increasing, making the implementation of appropriate security controls an increasingly difficult undertaking. Only those who know their risk profile are able to set the right priorities, deal with risks effectively and use available resources efficiently.
As condignum, we support you throughout the entire risk management process on the basis of recognised standards such as ISO/IEC 27005, ISO/IEC 31000 and BSI 200-3 - from the identification of threats and the assessment of risks to the planning of security controls.
Based on this, we can assist in the development of security concepts and technical security architectures that are tailored to your company and your use cases.
Implementation support for NIS2 / KRITIS
Cybersecurity for operators of critical infrastructures
The EU NIS2 Directive created minimum standards for the protection of critical infrastructures in Europe. With the implementation of the NIS Act in Austria and the IT Security Act (IT-SiG) in Germany, operators of essential critical services were obliged to implement technical and organizational security measures. The measures taken must be regularly verified and documented.
As an accredited qualified body (QuaSte), condignum supports you in the implementation and regular review of the applied security measures for effectiveness, appropriateness and efficiency.
NIS2 Readiness Check
Preparation for NIS2 compliance
With the NIS2 Directive, the EU has laid the foundations for increasing cyber security in Europe. Compared to the first version, the sectors affected have been massively expanded and regulations on supply chain security have been added. As a result, not only has the number of directly affected organizations increased enormously, but many organizations must also raise their security standards indirectly as suppliers to NIS2-relevant organizations.
Are you directly or indirectly affected by NIS2? But don't really know where to start due to the lack of national legislation in Austria?
Our NIS2 Readiness Check helps you to find out where you currently stand and where your biggest challenges lie in achieving NIS2 compliance.
As an accredited Qualified Body, we help you to interpret the current information situation in the best possible way and make the right decisions for your preparations for NIS2.
NIS inspection by qualified body
Proof of NIS compliance
Are you an operator of an essential service and need an audit by a Qualified Body to prove the correct implementation of the NIS requirements?
As an accredited Qualified Body with several accredited NIS auditors, condignum is happy to support you in verifying your compliance with the NIS Act.
Cyber Trust Label Austria
The Austrian seal of approval for cyber security
By obtaining the Cyber Trust Austria label - the Austrian seal of approval for cyber security - you can show that security is important to you and that your customers and partners can trust you.
As an accredited Qualified Body and Cyber Trust Austria Partner, we accompany you on the way to obtaining this seal of approval.
CISO as a Service
Expertise and a helping hand for cyber security
In every company, there should be a person who has an overview of the current state of information security and provides the management with the relevant information to make informed decisions. However, especially for SMEs, it is not always possible to hire a dedicated person for this purpose.
With the condignum "CISO as a Service" model, you get an experienced security expert at your side - exactly when you need him.