IT-/Telecommunication-provider

Branchen Icon

IT-/Telecommunication-provider

IT-Security in the IKT

IT- and Telecommunication-providers naturally are subjected to a high variety of different requirements. This is the case because they are contractually obligated by their respective clients to meet certain requirements with regard to their IT security. Furthermore there is genuine interest in certifying implemented security measures. They build the basis for a trustful cooperation. By systematically dealing with these risks and implementing IT security, a more valid basis for long-term planning of corporate development is also created.

Large parts of this sector are even legally obliged to reduce IT security risks by implementing an ISMS according to ISO/IEC 27001:2013. Another requirement is the establishment of a reporting office.

Our solution portfolio includes:

Your contact person

Ihr Ansprechpartner

Manfred Peine

Senior account manager
Tel. +49 2173 20363-0
Mail info-at-admeritia.de

Reference projects

  • ISMS structure
    • Network provider (telecommunication)
  • Extended Security Assessment
    • Network provider (telecommunication)
  • Technical Security tests
    • VoIP-Provider

more reference projects...

Committee work

  • ISECOM-Board
    • ISECOM
  • Member US-Chapter
    • OWASP
  • ISO IEC JTC1 SC27 (WG3 und WG4)
    • ISO

more committee work...

Lectures

  • Operationalization of an ISMS
    • 3. Kölner IT-Security Konferenz
    • Nov 2016
  • IT Security Law: What is in store for you?
    • it-sa 2015
    • Oct 2015
  • Recommended implementation of a detailed risk assessment according to IEC 62443 - 2 - 1
    • VDI Automation
    • Jun 2015

more lectures...

Publications

  • IT Security Law: What is in store for you?
    • Business informatics & Management
      Volume 7, Issue 4 , pp 18-27
    • Aug 2015
  • Recommended implementation of a detailed risk assessment according to IEC 62443 - 2 - 1
    • VDI Automation
    • Jun 2015
  • The next step for BSI, ISO2700x & Co: Operational Security Management with the Open Source Security Testing Methodology Manual (OSSTMM)
    • IT + Business
    • Oct 2010

more publications...