ISMS - Information Security Management System

Identify and minimise risks

An ISMS (Information Security Management System) is a systematic approach to protecting sensitive company information. Information assets in companies and organizations are protected in an appropriate and structured manner based on a risk assessment.

The implemented ISMS summarises the knowledge of an organisation to secure information assets with the protection goals of confidentiality, availability and integrity against compromise and thus avert consequences such as economic damage or loss of reputation.

 

Getting started with the information security management system

GAP analysis as an introduction

A GAP analysis is the first step towards the maturity level of your information security management system. The GAP analysis helps to identify gaps between the existing security measures and the requirements of recognised standards, such as ISO 27001.

Find out more about the GAP analysis now

Protect, optimise, certify

ISMS certification

The certification of an ISMS is mandatory for operators of critical infrastructures (KRITIS) and strengthens an organisation's resilience to business interruptions.

A well-maintained ISMS, which is audited annually, is the stable basis for optimising information security and IT security in a structured manner and integrating changing requirements.

Companies and organisations can have this structured approach to handling information assets certified by an external body.
Suitable standards are ISO/IEC 27001, BSI IT-Grundschutz and VdS 10000.

ISO/IEC 27001

Globally recognised standard to reduce risks in information security.

Learn more

BSI IT baseline protection

Predefined modules for the implementation of an ISMS.

Learn more

VdS 10000

Information security for small and medium-sized enterprises.

Learn more

External information security officer

Minimise risks with an external information security officer

Good external consultants have the ability to distinguish between the essential and the less important. With this characteristic, they can moderate and organise the entire process (establishment and operation of an ISMS) in a targeted manner.

Find out more

 

Frequently asked questions about information security

FAQ

What are information values?

Companies and organisations have (assets) values that can be in tangible and intangible form. These information assets can be, for example, patents, the company building, hardware and software, employee master data or access data to accounts.

An ISMS contains rules for identifying risks to information assets within a scope and protecting them appropriately against threats such as cyber attacks, theft, natural hazards or sabotage.

Information assets differ in terms of their importance for the company to carry out its business activities. If the loss of an information asset represents a high risk for the company, the need for protection of this information asset is categorised as "high" in terms of availability (primary asset). A company's patents are an example of another primary asset that requires special protection in terms of confidentiality.

In the rules of an ISMS, protection requirements can be inherited if there are dependencies between information assets.

What is information security?

The term information security contains various technical and non-technical measures that companies and organisations use to protect their information assets.

Information security measures serve to achieve the three protection goals of confidentiality, integrity and availability of information. Examples of information security measures are precautions to prevent unauthorised persons from entering the company building or to make the company network accessible only to authorised persons.

Information security and IT security - what is the difference?

IT security refers to IT systems and electronically secured information, while the term information security is broader. Information security includes non-technical systems, for example paper files or the company premises.

What are the protection goals of information security?

Confidentiality means that only authorised persons may view, process and manage data (information).

Integrity means that data (information) remains correct and may not be changed without being recognised.

Availability means that data (information) is accessible to authorised persons and must not be lost.

Do I need an external consultant to implement an ISMS?

In principle, the standards presented offer the possibility of implementing an ISMS on your own - possibly with the support of specialised literature. An external consultant is certainly a good choice if companies and organisations are aiming for certification.

Good external consultants have the ability to distinguish the essential from the less important. With this characteristic, they can moderate and organise the entire process (establishment and operation of an ISMS) in a target-oriented manner.

Feel free to contact us

Do you have any questions about our IT security solutions or do you need advice on the information security management system (ISMS)?
Our team of experts will be happy to help!

Doris Poppenborg

Vertrieb

Jörg Eckardt

CISO and Management Consultant

download

Integrating improvement into the corporate culture

Successful implementation of ISMS. ISMS with ConSecur - distinguishing the essential from the less important

Solution sheet ISMS Download

References and success stories

Our customers trust us

Find out how we have made data and infrastructures more secure and what our customers have to say about it.

CDC Unterstützung
ConSecur GmbH has trained 50 IT security analysts for a client in the banking sector

In five months, ConSecur set up an internal cyber defense team - future-proof and efficient.

Read reference article
ISMS
Resilient and legally compliant IT infrastructure for a transmission system operator

ConSecur has been strengthening the IT security of a transmission system operator for years and ensuring compliance with the IT Security Act.

Read reference article
SIEM-Pilotierung in 15 Tagen
Managed SIEM for Oldenburgische Landesbank

One of the requirements was the rapid deployment and scalability of an operational SIEM.

Read reference article
CDC Unterstützung
Pioneering work for Hewlett-Packard

Establishment of a Cyber Defense Center in Palo Alto

Read reference article
Distinguishing authorized access from anomalies
SIEM for AIRBUS DEFENCE AND SPACE

Recognize security incidents and initiate countermeasures.

Read reference article
Landesbank Baden-Wüttemberg
Cyber attacks - IT security for LBBW

Use cases for the SIEM

Read reference article