My Approach
Strengthening your data security

Initial familiarisation with your company, processes and challenges
My approach is based on long-term partnerships. It is therefore essential for me to develop a deep understanding of your company, your markets and your customers. What makes your business unique? What products or services do you offer?
At the same time, we need to identify your biggest data security challenges (pain points) and understand what has been done so far to solve them. The big pain points could include not only technical problems, but also organisational or procedural challenges.
Arrange your initial consultation
My methodology for improving your data security
As an independent IT consultant, I am an expert in data security and data protection. My systematic approach covers four core areas:
1. Preventive data security
The best defence is well-thought-out prevention. We rely on:
- Proactive monitoring for the early detection of suspicious activities involving sensitive customer, financial and health data directly inside the database
- Implementation of auditing systems for seamless logging of all access to sensitive data
- Securing privileged accounts against misuse through:
- Strict access controls
- Periodical review of authorisations using auditing tools
- Comprehensive vulnerability analysis of your databases and data-relevant processes
2. Optimisation of your security concept
An effective information security management system (ISMS) is the key to the sustainable protection of your data:
- Development of practical security concepts based on:
- ISO/IEC 27001
- DIN SPEC 27076
- BSI IT-Grundschutz in Germany
- Cost-efficient measures with maximum security gain
- Integration of external partners into your security concept
- Continuous update according to new requirements

3. Incident Response and Forensic
In the event of security incidents, quick and competent action counts:
- Professional analysis after data leaks:
- Identification of the attack vectors
- Documentation of the incident
- Forensic investigation
- Immediate measures for damage limitation
- Support for communication with authorities
- Development of improved protective measures based on the findings
4. Complementary technical security expertise
Modern IT security requires in-depth technical understanding:
- code and architecture analyses of existing applications
- Security consulting for cloud migrations taking into account:
- Data protection requirements
- Compliance requirements
- Architecture principles
- External and independent review of implemented security measures

My quality promises
As an independent consultant, I guarantee:
- Objective recommendations without being tied to specific software products
- Pragmatic solutions that can be integrated into your day-to-day business
- Continuous support during the implementation of the security measures
- Transparent communication about risks and alternatives
Find out how I can help you