STEPMODULEOBJECTIVEDURATION
1Gap Analysis & Risk AssessmentAnalysis of the existing IT and security landscape. Identification of vulnerabilities and risks based on ISO/IEC 27005 and NIS-2 specific requirements.2 weeks
2Governance & Compliance FrameworkDevelopment of a tailored governance model including policies (e.g., ISMS, BCM), role models (CISO, Security Officer), and internal control mechanisms.3 weeks
3Technical & Organisational Measures (TOMs)Development of a catalog of measures including SIEM, IDS/IPS, vulnerability management, physical security measures, and cloud security guidelines.3-4 weeks
4Awareness TrainingRollout of target-group-oriented training, including for IT, business units, and executive management.2 weeks
5Continuous Monitoring & Incident ResponseEstablishment of effective security monitoring and creation of an emergency and reporting concept according to NIS-2 obligations.ongoing

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.