The digital transformation presents many new challenges, also in terms of security. And despite security technology and tools: A residual risk remains. We meet this challenge with the strategic information security concept called “assume breach”, which also covers emergency plans.

Key issues are also the fast recognition of cyber-attacks and the restoration of normal status. As an all-round partner for information security, we support you in realigning your information security strategy and implementing a comprehensive approach. With us and maximum security you are on the road to innovation and growth with digital business models and technologies.

How we support you

Big data, cloud, IoT, mobile communications, social media etc.: No matter which new technologies you use – COCUS ensures maximum information security. We support you not only at the technical level, but also the strategic and legal levels. At these levels, we possess a comprehensive knowledge of security policies, taking into account cloud environments and bring-your-own-device (BYOD) issues, overall project management as well as compliance requirements from different areas (BSI basic IT protection, ISO27001, PCI-DSS, SOX).

In addition, you benefit from our strategic approach which takes all relevant factors into account: personnel, organisations, processes, technologies. On this basis, we identify your requirements and work out a coherent overall concept. Our focus: the development of a proactive strategy. This enables you to realize your digital plans while also strengthening your company’s security competence.

Regardless of which technologies you employ, security is part of it:

Internet of Things
Big Data

Of course, we also assist you with comprehensive individual services:

  • Creation and introduction of compliance, information security and risk management frameworks
  • Introduction of assistive technologies to prevent data loss (data leakage prevention)
  • Introduction of assistive technologies for data retention
  • Concept, design and implementation of security architectures, including engineering
  • Conduction of risk assessments, preventive measures and source-code audits (web/mobile)
  • Configuration of MySQL firewall, threat monitoring and database intrusion detection
  • Inventory of IT assets including potential vulnerabilities
  • Implementation of directives pursuant to the IT Security Act (IT-SIG)
  • Conduction of penetration tests (according to SI guidelines) and system hardening
  • Testing – ethical hacking – and assessment of information security (red teaming)
  • Investigation of service misuse and security breaches (data breach forensics)
  • Development and implementation of business continuity concepts
  • Establishment and conduction of security monitoring using Splunk
  • Design of incident-management processes with integration of Splunk and ServiceNow
  • Support in selecting threat intelligence providers
  • Overall project management during introduction of managed security providers (security operations centres)
  • Implementation of awareness campaigns and phishing education
  • Holding of end-user training courses and risk-management workshops
  • Communication of aspects such as embedded security and privacy by design

Smart-Home-Produkte als Sicherheitslücke

20.12.2017|Comments Off on Smart-Home-Produkte als Sicherheitslücke

Die ComputerWoche thematisiert die Sicherheitslücken von Smart Home Produkten. Als Experte für IoT fordert Oliver Hüttig, Vorstand der COCUS AG strengere Richtlinien und ein größeres Sicherheitsbewusstsein auch bei privaten Anwendern von Smart Home Produkten und IoT-Anwendungen.

Cyber-Versicherung für Webseitenbetreiber

24.1.2017|Comments Off on Cyber-Versicherung für Webseitenbetreiber

Mit AssuredSecurity haben die COCUS AG und die HDI Versicherung AG eine neuartige 360°-Absicherung gegen Cyber-Risiken entwickelt, die Unternehmen einen umfassenden Schutz für Webseiten und Applikationen bietet.

  • cocus zu cyberversicherungen

Wie Cyber-Versicherungen schützen können

11.11.2016|Comments Off on Wie Cyber-Versicherungen schützen können

Um sich vor den Folgen von Cyber-Angriffen besser schützen zu können, bieten immer mehr Versicherungshäuser Cyber-Versicherungen an. Das allein genügt aber nicht - auch die möglichen Gefahren der Zukunft wollen beachtet sein.

Talk to us about your next project 

Contact us by phone or mail

Contact us