

Free ISMS ConsultantGPT
Available anytime and free of charge instead of cheap, the online ISMS Consultant for quick progress. ⚫️⚫️🔴


Hidden Threat: Hardware Trojans in IT Manufacturing
The PANDA study by BSI reveals the risk of hardware trojans in modern IT systems and how to defend against them.


ChatGPT as ISMS consultant
The best prompt for your own ConsultantGPT.


NIS2: A potential implementation and audit basis
Übersichtstabelle für NIS2-Compliance auf Basis von ISO/IEC 27001, nützlich als erste Prüfgrundlage und Planungshilfe.


‘Regular’ in the TISAX context: A guide for companies and consultants
This article examines the meaning and interpretation of the term ‘regular’ in the TISAX® context.

The role of internal ISMS on-site audits
I will discuss the importance of on-site audits and explain why they are essential to the integrity and effectiveness of the audit process.


Critical Infrastructure: Drone Identification Systems
The recent incident in Brunsbüttel, where drones were repeatedly sighted over one of the largest chemical parks in Schleswig-Holstein…


Update 2024: Which laws are particularly relevant in the context of information security?
An updated overview of laws and some contractual requirements that can/should influence the policies in an ISMS.


(Draft) Information Security Guideline
Global Information Security Policy: Clear guidelines and flexible implementation for maximum security and efficiency.


VDA ISA: Must and Should Requirements
Must requirements are mandatory, while should requirements have to be implemented unless there are good reasons against it.