Your career in IT security and reporting
Confidentiality, the accuracy of information and the minimization of information risks are just some of the issues we consider. Let’s revolutionize our customers’ security!
Why Regulation & Information Security?
In the course of digitization, IT is becoming more and more important, which means that IT risks are also increasing. In IT security management, we pursue this goal, Close security gaps and prevent risks by establishing comprehensive action plans, implementing IT security tools, and optimizing efficiency and process quality.
Our focus topics
Identity Access Management
In the management of identities and access rights ( IAM) , you put your focus on the on the protection of confidentiality and correctness of information. Knowing who has access to which ITSystems and information access has and to prevent not everyone has access to it, is for a modern IT landscape is essential.
Outsourcing Management
As a cross-sectional topic, the Outsourcing management the Possibility to create complex and interlocking elements of the ITsafety and thus an overarching understanding of develop From the structure of the
written order, through the processes
processes to the controls
we cover all areas.
Individual data processing
Due to high criticality of processed information, you will ensure in individual data processing that self-developed tools of the banking and insurance industry, e.g. based on Excel or even Python, to protect and manage.
Information Risk Management
In information risk management you identify risks and the measures to be protective crown jewels in IT. Here we define risk-reducing measures and create processes for management of risks. In doing so, we create a
Risk culture and awareness for
dealing with risks in IT.
OUR METHODOLOGICAL BASIS
Project management forms
the basis of our daily
work and provides us with the
tools to do this efficiently.
master. As methodical
ability it therefore complements
our professional
focus topics.
THAT MAKES US
FROM
What do we value?
We attach importance to a good and honest cooperation, because we are team players! That means we watch each other’s backs, give honest each other’s backs, give honest feedback and support each other.
At our company, everyone takes on small internal shows initiative and commitment and thus contributes to the contribution to the further development of our team and ADWEKO.
What makes us different?
Our ITSM team, built up at ADWEKO since 2021, consists of a colorful mix of experienced professionals and young guns, who work together on the work on the topics of IT security.
Through a planned, prudent and firm view of our goals, we lay the foundation for our the foundation stone of our success, without losing sight of the fun. without losing sight of the fun.
How do we work?
Whether at the customer or internally, we always give our all. In addition to professional competence, we always willingness to help, “going the extra mile”, is always in the foreground. Cooperation is the name of the game.
Mutual trust in each other’s abilities forms the foundation the cornerstone of success, because with us you can rely on everyone on everyone, both personally and professionally.
We value good and honest cooperation, because we are team players! This means that we have each other’s each other, give honest feedback and support each other.
With us, everyone also takes on small internal tasks, shows initiative and commitment and thus makes a contribution contribution to the further development of our team and ADWEKO.
Our ITSM team, built up at ADWEKO since 2021, consists of a colorful mix of experienced professionals and young guns, who work together on the work on the topics of IT security.
Through a planned, prudent and firm view of our goals, we lay the foundation for our the foundation stone of our success, without losing sight of the fun. without losing sight of the fun.
Whether at the customer or internally, we always give our all. In addition to professional competence, we always willingness to help, “going the extra mile”, is always in the foreground. Cooperation is the name of the game.
Mutual trust in each other’s abilities forms the foundation the cornerstone of success, because with us you can rely on everyone on everyone, both personally and professionally.
cross-sectional work on consulting areas
The protection of information and the security of IT is a cross-cutting issue in IT management. In addition to the specialist disciplines such as IAM and outsourcing, the IT security management, overarching requirements for IT such as the establishment of a governance -structure or the management of information risks.
Accordingly work We work together with all IT departments and the business on a daily basis. Together with our partners within the X1F, such as Matrix, we cooperate very closely to provide our We are able to offer customers IT security from a single source, whereby we take on the project-based implementation of IT security requirements and our colleagues take on the secure long-term operation of the IT. operation of the IT.