Abstract digital background with a network of interconnected glowing blue nodes and lines forming a mesh pattern on a dark gradient backdrop.

Cybersecurity Program Management

Objectives
Challenges

Setting up a cybersecurity program to increase IT security in the organization based on Zero Trust principles. The program is based on the strategy that was developed and covers all areas of IT such as identities, endpoints, applications, network and data.

Results
achieved

  • Program management and concept support for project topics such as

    • Identity & Access Management

    • Endpoint Management

    • User Lifecycle Process & Governance

    • Privileged Identity & Access Management

    • IT Asset & Inventory Management

    • Security Awarness & Training

    • Business Continuity Management

    • Incident Detection & Response

  • Management Report

Categories

Cybersecurity

Date

6 months, 2024

Client

Industrial company (international, approx. 1,600 employees)

Cybersecurity Program Management

Objectives
Challenges

Setting up a cybersecurity program to increase IT security in the organization based on Zero Trust principles. The program is based on the strategy that was developed and covers all areas of IT such as identities, endpoints, applications, network and data.

Results
achieved

  • Program management and concept support for project topics such as

    • Identity & Access Management

    • Endpoint Management

    • User Lifecycle Process & Governance

    • Privileged Identity & Access Management

    • IT Asset & Inventory Management

    • Security Awarness & Training

    • Business Continuity Management

    • Incident Detection & Response

  • Management Report

Categories

Cybersecurity

Date

6 months, 2024

Client

Industrial company (international, approx. 1,600 employees)

Cybersecurity Program Management

Objectives
Challenges

Setting up a cybersecurity program to increase IT security in the organization based on Zero Trust principles. The program is based on the strategy that was developed and covers all areas of IT such as identities, endpoints, applications, network and data.

Results
achieved

  • Program management and concept support for project topics such as

    • Identity & Access Management

    • Endpoint Management

    • User Lifecycle Process & Governance

    • Privileged Identity & Access Management

    • IT Asset & Inventory Management

    • Security Awarness & Training

    • Business Continuity Management

    • Incident Detection & Response

  • Management Report

Categories

Cybersecurity

Date

6 months, 2024

Client

Industrial company (international, approx. 1,600 employees)