Knowledge & Practice

Practical knowledge for CISOs, IT managers, and executives

NIS2
NIS2

NIS2 for SMEs: What You Need to Know and What to Do Now

Since December 2025, NIS2 applies in Germany as well. For mid-market companies with 50 or more employees or over EUR 10 million in revenue, this me...

2026-02-01 12 min read
NIS2
NIS2

NIS2 Initial Report to the BSI: Content, Deadlines, and Template

The NIS2 initial report must reach the BSI within 24 hours. This article shows you what mandatory information the report must contain, when an inci...

2026-02-02 10 min read
NIS2
NIS2

NIS2 Reporting Deadlines at a Glance: 24h, 72h, 1 Month — What Is Due When

NIS2 requires three reporting stages for security incidents: initial report within 24 hours, update after 72 hours, and final report after one mont...

2026-02-03 8 min read
NIS2
NIS2

NIS2 Fines: Who Is Liable and How High Are the Penalties?

NIS2 brings significant fines and personal liability for management. Up to EUR 10 million or 2% of global annual revenue for violations. We explain...

2026-02-04 8 min read
NIS2
NIS2

NIS2 vs. ISO 27001: Differences, Similarities, and How Both Fit Together

NIS2 is a law, ISO 27001 is a standard. Both require an ISMS, but with different focus areas. This article shows you where requirements overlap, wh...

2026-02-05 10 min read
ISMS
ISMS

Which Frameworks Do I Need? NIS2, ISO 27001, BSI IT-Grundschutz, TISAX Compared

Six frameworks, six different approaches — but which one do you actually need? This article compares NIS2, ISO 27001, BSI IT-Grundschutz, TISAX, BS...

2026-02-06 12 min read
ISMS
ISMS

Building an ISMS: The Complete Guide for Companies with 50 to 500 Employees

Building an ISMS sounds like a mammoth project. This guide shows you step by step how to introduce an information security management system based ...

2026-02-07 15 min read
ISMS
ISMS

Defining the Scope: What Belongs in the ISMS and What Does Not?

The scope is the foundation of every ISMS. If you define it incorrectly, you are building on sand. This article shows you step by step how to prope...

2026-02-08 8 min read
ISMS
ISMS

Creating a Statement of Applicability (SoA): Selecting and Justifying Controls

The SoA is the centerpiece of your ISMS. Learn how to systematically evaluate ISO 27001 Annex A controls, justify applicability, and document imple...

2026-02-09 10 min read
ISMS
ISMS

Key ISMS Roles: ISM, CISO, Risk Owner – Who Does What?

ISM, CISO, risk owner, asset owner – an ISMS depends on clearly assigned responsibilities. This article shows which roles you need, what each role ...

2026-02-10 8 min read
NIS2
NIS2

NIS2 for Food Manufacturers and Wholesale Distributors

The food industry is classified as a sector of high criticality under NIS2. Cold chains, ERP systems, inventory management, and HACCP interfaces cr...

2026-03-31 14 min read
Richtlinien
Richtlinien

Writing an Information Security Policy: Structure, Content, and Example

The information security policy is the foundation of every ISMS. This guide shows you the structure, mandatory content per ISO 27001, sample wordin...

2026-02-11 12 min read
Richtlinien
Richtlinien

Creating a Password Policy: Requirements, Example, and Enforcement

A password policy is among the most fundamental documents of any ISMS. This article shows you what BSI and NIST currently recommend, how to formula...

2026-02-12 14 min read
Richtlinien
Richtlinien

Mobile Device Usage Policy (BYOD/MDM)

Mobile devices are indispensable in today's work environment but bring significant security risks. This article explains the differences between BY...

2026-02-13 15 min read
Richtlinien
Richtlinien

Access Control Policy: Physical and Logical

Physical and logical access control form the foundation of every ISMS. This article explains the difference between physical and logical controls, ...

2026-02-14 15 min read
Richtlinien
Richtlinien

Policy Lifecycle: From Creation to Retirement

Writing policies is only the beginning. To remain effective, they need a defined lifecycle: drafting, review, approval, publication, acknowledgment...

2026-02-15 14 min read
Risikomanagement
Risikomanagement

Risk Assessment in the ISMS: Methodology, Matrix, and Practical Example

The risk assessment is the heart of every ISMS. This article shows you step by step how to conduct a qualitative risk assessment with a 5x5 matrix,...

2026-02-16 18 min read
Risikomanagement
Risikomanagement

Risk Treatment: Mitigate, Accept, Transfer, or Avoid

After the risk assessment comes the decisive question: What now? This article explains the four treatment options in an ISMS, demonstrates with pra...

2026-02-17 16 min read
Risikomanagement
Risikomanagement

Top 10 Information Security Risks for Mid-Market Companies

Which information security risks hit SMEs the hardest? This article analyzes the ten most common risks with likelihood, typical impact, and concret...

2026-02-18 20 min read
Incident Response
Incident Response

Detecting, Assessing, and Reporting a Security Incident - The Complete Process

Ransomware encrypts the network, an employee clicks a phishing link, the monitoring system raises an alarm - and then? This article describes the c...

2026-02-19 14 min read
ISMS
ISMS

Your First 100 Days as a CISO (Information Security Officer): Priorities, Quick Wins, and Pitfalls

You've just taken on the role of CISO (Information Security Officer) and wondering where to start? This article gives you a concrete roadmap for yo...

2026-04-05 17 min read
Datenschutz
Datenschutz

Reporting a GDPR Data Breach: When, How, and to Whom

72 hours. That is how much time you have to report a notifiable data breach to the supervisory authority. This article explains when a data breach ...

2026-02-20 13 min read
ISMS
ISMS

Data Sovereignty in Your ISMS: Why Your Risk Register Doesn't Belong in the Cloud

Your ISMS contains the most sensitive data in your organization: vulnerabilities, risk registers, incident details, audit reports. Entrusting this ...

2026-03-23 12 min read
Datenschutz
Datenschutz

CLOUD Act, Schrems II, and Your ISMS: What You Need to Know About US Government Data Access

The CLOUD Act gives US authorities access to data held by US providers, regardless of where the servers are located. Schrems II blew up the foundat...

2026-03-23 10 min read
ISMS
ISMS

Vendor Lock-in in Compliance Software: How to Keep Control of Your ISMS

Proprietary data formats, missing export functions, opaque contract terms: vendor lock-in is a real risk in compliance software with costly consequ...

2026-03-24 10 min read
ISMS
ISMS

SaaS vs. Self-Hosted: The True Cost of Compliance Software Over 5 Years

License costs are just the tip of the iceberg. This article calculates what SaaS compliance tools and self-hosted solutions actually cost over five...

2026-03-24 12 min read
Audit
Audit

ISMS Audit and Data Storage: Why the Auditor Wants to Know Where Your Data Resides

In the certification audit, the auditor asks not only about policies and processes but also about where your ISMS data actually resides. Cloud sub-...

2026-03-25 10 min read
ISMS
ISMS

Self-Hosted ISMS with Docker: Setup, Backup, and Maintenance in Practice

ISMS Lite runs with a single command on your own server. This article shows you the complete setup with Docker Compose, explains the architecture b...

2026-03-25 12 min read
Datenschutz
Datenschutz

GDPR-Compliant ISMS Hosting: Requirements for Storing Your Compliance Data

An ISMS tool processes personal data: names of risk owners, training participants, auditors. This brings it under the DSGVO (GDPR). This article sh...

2026-03-26 10 min read
ISMS
ISMS

Your Company's Crown Jewels: Why ISMS Data Needs Special Protection

Your ISMS documents every vulnerability, every open control status, and every risk assessment in your organization. For an attacker, that is more v...

2026-03-26 10 min read
Incident Response
Incident Response

Creating an Incident Response Plan: Template and Practical Example

An incident response plan describes who does what during a security incident, in what order, and with what resources. This article provides the com...

2026-02-21 15 min read
NIS2
NIS2

NIS2 and Data Sovereignty: What the Directive Says About Controlling Your Data

NIS2 demands not only technical security, but also sets requirements for control over your data and supply chains. This article shows how data sove...

2026-03-27 10 min read
BCM
BCM

Securing ISMS Data: Backup Strategy for Self-Hosted Compliance Systems

If your ISMS runs self-hosted, you bear the responsibility for data backup. This article shows you how to build a backup strategy for database and ...

2026-03-27 10 min read
ISMS
ISMS

From the Cloud to Your Own Server: ISMS Migration Without Data Loss

More and more companies are switching from cloud ISMS solutions to self-hosted systems. Reasons range from uncontrollable cost increases and compli...

2026-03-28 12 min read
ISMS
ISMS

ISMS Without Cloud Dependency: Why Offline Capability Is Not a Relic

Your auditor is on-site, the Wi-Fi goes down, and your cloud ISMS is unreachable. Or your production environment deliberately has no internet acces...

2026-03-28 8 min read
ISMS
ISMS

Digital Sovereignty for SMEs: More Than a Political Buzzword

Digital sovereignty sounds like EU summits and position papers. But behind it lies a very concrete question for every company: who controls your da...

2026-03-29 10 min read
ISMS
ISMS

ISMS for MSPs: Why Self-Hosted Per Customer Is the Better Architecture

Multi-tenancy sounds efficient — until a single breach affects all customer data. For Managed Service Providers offering ISMS as a service, one ins...

2026-03-29 10 min read
ISMS
ISMS

Encrypting ISMS Data: At Rest, In Transit, and In Backups

ISMS data is among the most sensitive information in any organization: vulnerability analyses, risk registers, audit reports. This article shows ho...

2026-03-29 10 min read
BCM
BCM

Creating a Recovery Plan: Guide with Template for SMEs

A recovery plan defines how you systematically bring business operations back online after an outage. This article shows you the structure, explain...

2026-02-22 14 min read
BCM
BCM

Conducting a Business Impact Analysis (BIA): Evaluating Business Processes

The Business Impact Analysis identifies your critical business processes and assesses the impact of an outage. This article shows you how to conduc...

2026-02-23 15 min read
BCM
BCM

IT Emergency Handbook: Structure, Content, and PDF Template

The IT emergency handbook bundles all the information you need in an emergency: escalation chains, contact lists, reporting paths, and response pla...

2026-02-24 14 min read
BCM
BCM

Planning and Conducting a Tabletop Exercise: How to Test Your Emergency Plan

A tabletop exercise tests your emergency plan without touching any systems. Participants walk through a scenario at the table and uncover gaps that...

2026-02-25 14 min read
BCM
BCM

Backup Strategy and Restore Tests: Because Backups Alone Are Not Enough

A backup without a restore test is a gamble. This article explains the 3-2-1 rule, backup types, retention periods, immutable backups against ranso...

2026-02-26 15 min read
Audit
Audit

Conducting an Internal ISMS Audit: Planning, Checklist, and Report

An internal audit is not a tedious formality — it is your most powerful tool for finding weaknesses in the ISMS before an external auditor does. Th...

2026-02-27 14 min read
Audit
Audit

Management Review per ISO 27001: Agenda, KPIs, and Minutes

The management review is the moment when top management puts its ISMS to the test. Not the IT department, not the ISO — top management. This articl...

2026-02-28 13 min read
Audit
Audit

Evaluating Audit Findings and Deriving Actions

An audit finding is just the beginning. The real value emerges only when you correctly assess the finding, analyze the root cause, and define a cor...

2026-03-01 13 min read
Datenschutz
Datenschutz

Creating a Record of Processing Activities (ROPA) per Art. 30 DSGVO (GDPR)

A record of processing activities per Art. 30 DSGVO (GDPR) is mandatory for almost every organization. This article shows you which details are req...

2026-03-02 14 min read
Datenschutz
Datenschutz

Documenting Technical and Organizational Measures (TOMs)

TOMs per Art. 32 DSGVO (GDPR) are the backbone of any data protection documentation. This article explains the 8 classic TOM categories, provides c...

2026-03-03 15 min read
Datenschutz
Datenschutz

Data Processing Agreements: How to Review DPAs and Assess Service Providers

A DPA (Data Processing Agreement) is quickly signed but rarely thoroughly reviewed. This article shows you when data processing on behalf of a cont...

2026-03-04 14 min read
ISMS
ISMS

Creating an Access Control Concept: Roles, Permissions, and Approval Workflow

An access control concept defines who may access which systems and data. Without it, there is no control over which employees actually hold which p...

2026-03-05 14 min read
ISMS
ISMS

User Lifecycle: Managing Onboarding, Offboarding, and Role Changes

When a new employee starts, they need access to all relevant systems on day one. When someone leaves the company, all accounts must be deactivated ...

2026-03-06 13 min read
Asset-Management
Asset-Management

IT Asset Management for the ISMS: Inventory, Criticality, and Classification

An ISMS without an asset inventory is like an insurance policy without knowing the insured objects. This article shows you how to build a complete ...

2026-03-07 14 min read
Asset-Management
Asset-Management

Protection Needs Assessment: Evaluating Confidentiality, Integrity, and Availability

The protection needs assessment is the link between the asset inventory and the risk assessment. This article explains the BSI methodology, the thr...

2026-03-08 13 min read
Schulung
Schulung

Building a Security Awareness Program: What Employees Really Need to Know

Technical safeguards alone are not enough when employees click on phishing emails or write passwords on sticky notes. A well-designed security awar...

2026-03-09 14 min read
Schulung
Schulung

Training Records in the ISMS: What Must Be Documented

Conducting training is one thing. Documenting it so that the auditor is satisfied and the records are still traceable three years later is another....

2026-03-10 13 min read
Incident Response
Incident Response

Ransomware Attack: Immediate Response, Communication, and Recovery

When ransomware strikes, every minute counts. The decisions made in the first half hour determine whether damage stays contained or the entire orga...

2026-03-11 16 min read
Schulung
Schulung

Phishing Detection and Reporting: A Practical Guide for Employees and IT

Phishing is the number one attack vector, and attacks are becoming increasingly sophisticated. This practical guide shows how employees can reliabl...

2026-03-12 15 min read
ISMS
ISMS

Implementing Multi-Factor Authentication (MFA): Strategy, Rollout, and User Adoption

MFA is one of the most effective defenses against compromised credentials and is listed as one of the ten minimum measures under NIS2. Yet many org...

2026-03-13 15 min read
ISMS
ISMS

Network Segmentation for SMEs: Why and How to Partition Your Network

A flat network is like a building without fire doors: once an attacker is in, they can move freely. Network segmentation limits the blast radius, p...

2026-03-14 15 min read
ISMS
ISMS

Patch Management for Mid-Market Companies: Process, Prioritization, and Automation

Unpatched systems are the wide-open barn door of IT security. Yet many mid-market companies struggle with a structured patch process: too many syst...

2026-03-15 15 min read
ISMS
ISMS

Email Security: Setting Up SPF, DKIM, DMARC, and Encryption Correctly

Email is the most common attack vector for cyberattacks on businesses. Phishing, spoofing, and business email compromise can be significantly thwar...

2026-03-16 16 min read
ISMS
ISMS

Zero Trust for Mid-Market Companies: Implementing the Principles Without an Enterprise Budget

Zero Trust is not a product you buy but an architectural principle you implement step by step. Even without a six-figure budget, you can embed the ...

2026-03-17 15 min read
ISMS
ISMS

Secure Remote Work: VPN, Endpoint Security, and Policies for Home Offices

Home offices and remote work are part of everyday life, but many companies' security concepts are still designed for the office. This article cover...

2026-03-18 16 min read
ISMS
ISMS

Encryption in the Enterprise: What, Where, and How to Encrypt

Encryption is one of the ten NIS2 minimum measures and a central building block of every ISMS. But what exactly needs to be encrypted, which algori...

2026-03-19 16 min read
ISMS
ISMS

Securing Active Directory: The 10 Most Important Measures

Active Directory is the heart of virtually every Windows environment and therefore the primary target in cyberattacks. Whoever controls AD controls...

2026-03-20 16 min read
ISMS
ISMS

Logging and Monitoring: What You Should Log and Why

Without logs, you're blind. Without monitoring, you're deaf. And without both, you only find out something happened when it's too late. This articl...

2026-03-21 15 min read
NIS2
NIS2

NIS2 for IT Service Providers and MSPs: The Dual Role as Affected Party and Advisor

IT service providers and Managed Service Providers face a unique challenge under NIS2: They are directly affected and must simultaneously support t...

2026-03-22 14 min read
NIS2
NIS2

NIS2 for Mechanical Engineering and Manufacturing

The manufacturing sector is among those regulated by NIS2 through Annex II. For mechanical engineers, this means: OT security, IT/OT convergence, a...

2026-03-27 13 min read
NIS2
NIS2

NIS2 for Logistics and Transportation: Requirements and Implementation

Transport and logistics are among the sectors of high criticality under NIS2 (Annex I). Freight forwarders, logistics centers, and transportation c...

2026-03-28 13 min read
NIS2
NIS2

NIS2 for Healthcare: Hospitals, Laboratories, and Medical Technology

Healthcare is classified as a sector of high criticality under NIS2. Hospitals, laboratories, pharmaceutical companies, and medical device manufact...

2026-03-29 14 min read
NIS2
NIS2

NIS2 for Energy Suppliers and Municipal Utilities

Energy is classified as a sector of high criticality under NIS2 and is therefore subject to the strictest requirements. For municipal utilities and...

2026-03-30 14 min read
ISMS
ISMS

TISAX Certification: Requirements, Process, and Assessment for Automotive Suppliers

TISAX is the information security standard of the automotive industry and a prerequisite for working with OEMs like VW, BMW, or Mercedes. This arti...

2026-04-02 15 min read
ISMS
ISMS

IT Security for Skilled Trades and Small Businesses Under 50 Employees

Even without NIS2 obligations, skilled trades and small businesses face daily cyber threats. Ransomware hits a small electrical contractor just as ...

2026-03-28 14 min read
ISMS
ISMS

Choosing ISMS Software: What Matters in the Evaluation

Excel spreadsheets, SharePoint folders, or a specialized ISMS tool? Anyone running an information security management system will sooner or later f...

2026-03-25 14 min read
ISMS
ISMS

Self-Hosted vs. Cloud: Data Sovereignty in Compliance Software

Compliance software manages the most sensitive data in an organization: risk assessments, security vulnerabilities, audit results. Where this data ...

2026-03-26 14 min read
ISMS
ISMS

What Does an ISMS Cost? Realistically Estimating Budget, Effort, and ROI

Building an ISMS costs money, time, and attention. But how much exactly? This article breaks down the cost factors, provides realistic budget range...

2026-03-23 15 min read
ISMS
ISMS

CISO: External or Internal? Pros and Cons for Mid-Market Companies

The Information Security Officer is the central figure in the ISMS. But does it have to be a dedicated employee, or can an external service provide...

2026-04-01 14 min read
ISMS
ISMS

ISO 27001 Certification: Process, Costs, and Effort for SMEs

ISO 27001 certification is achievable for SMEs when the process is clear and costs are planned realistically. This article explains the entire cert...

2026-03-24 14 min read
ISMS
ISMS

Cybersecurity as a Competitive Advantage: Why Customers Are Asking

Cybersecurity has long ceased to be a purely IT topic. More and more customers and clients demand verifiable evidence before awarding contracts. Or...

2026-04-03 13 min read
NIS2
NIS2

NIS2 Implementation on a Limited Budget: Setting Pragmatic Priorities

No dedicated security team, no six-figure budget, and still need to become NIS2-compliant? It's possible. This article shows how to prioritize the ...

2026-04-03 14 min read
ISMS
ISMS

ISMS Documentation: Which Documents You Actually Need (and Which You Don't)

Documentation is the backbone of every ISMS. But between mandatory documents per ISO 27001, recommended evidence, and unnecessary paperwork, there'...

2026-04-05 14 min read
NIS2
NIS2

NIS2 Checklist: All Requirements at a Glance

NIS2 confronts organizations with a multitude of requirements: registration, ten minimum measures, reporting obligations, governance, supply chain ...

2026-04-01 15 min read
ISMS
ISMS

Securing Microsoft 365: The 15 Most Important Security Settings

Microsoft 365 is run out-of-the-box in most companies, yet the default settings are far from secure. This article describes the 15 most important s...

2026-04-04 22 min read