cybersecurity_12_1920x540

GOVERNANCE, RISK & COMPLIANCE

We support you in implementing internal processes and procedures, and we guide you through a compliance check and analyse your IT landscape to identify risks.

GOVERNANCE AND COMPLIANCE MANAGEMENT

FIRSTSPIRIT_LINKCompliance and internal governance services are part of a company's value proposition: compliance with statutory requirements, regulations and agreed business rules. Let us help you define internal processes and procedures, implement and monitor them and advise you on fulfilling and implementing GDPR requirements in your IT infrastructure, in the cloud and on end-user devices. What we offer:

General compliance topics:

  • Compliance Initial Analysis (1-day workshop)

Data Compliance (GDPR):

  • GDPR Initial Analysis (2-day workshop with focus on SAP)
  • GDPR Functional Specification and Implementation (Consulting)
  • GDPR Package (with focus on SAP HCM)
  • GDPR in the Cloud (SAP SuccessFactors & Consulting)
  • GDPR Initial Analysis on Data Protection in Office 365 (1-day workshop)
  • Data Classification (Consulting)

Licence Compliance (Contracts):

  • Cloud Software Licensing (Consulting)
  • Microsoft Contract Models (Consulting)
  • Licence Management Processes (Consulting)

Process Compliance (Consulting on GDPR & business processes)

media alt text

FIND OUT MORE FROM OUR EXPERTS

Professional article in Employ! HR Magazin

"Have your deleted personal data yet? Confidently implementing GDPR in your SAP HCM system."

READ ARTICLE

RISK MANAGEMENT

For many companies, the starting point for developing an individualised security strategy is a check-up on security measures. Let us help you design a strategy tailored to your company, ensuring greater IT security, and build a roadmap. This is based on the results document of the IT Security Assessment and the fields of action derived from it. Additional analyses to reinforce security:

  • IT Security Assessment (2-day workshop)
  • Shadow IT Analysis (1½-day workshop)
  • Active Directory Vulnerability Check
  • Consulting & Active Pen Testing
  • User Awareness (tools/training/e-learning)
  • Data Protector for SAP (consulting, design, implementation & licensing)
  • Mobile Endpoint Security (consulting, design, implementation & operations)

FIND OUT MORE FROM OUR EXPERTS

Professional article in Mittelstand Heute magazine

Simple tips to prevent hacker attacks: these 5 rules are especially important for ensuring IT security at mid-sized companies.

READ ARTICLE

Solution Package Flyer

"Mobile Endpoint Security - Effective Data Protection on Mobile End-User Devices"

PDF

WE HAVE PROVEN TO CUSTOMERS THE PRESENCE OF 500 CLOUD APPLICATIONS ALONE OF WHICH THEY HAD PREVIOUSLY BEEN UNAWARE.

PETER ROSENDAHL, DIRECTOR SOLUTIONS CYBERSECURITY, CLOUD ARCHITECTURE & NEW WORK, ALL FOR ONE GROUP SE