Your CAREER IN

IT Security

management

Confidentiality, the correctness of information and the minimization of information risks are just some of the issues we look at in ITSM. Let’s revolutionize our customers’ security!

Why IT security management?

In the course of digitization, IT is becoming more and more important, which means that IT risks are also increasing. In IT Security Management we pursue the goal, Close security gaps and prevent risks by establishing comprehensive action plans, implementing IT security tools, and optimizing efficiency and process quality.

Our focus topics

Identity Access Management

In the management of identities and access rights ( IAM) , you put your focus on the on the protection of confidentiality and correctness of information. Knowing who has access to which ITSystems and information access has and to prevent not everyone has access to it, is for a modern IT landscape is essential.

Outsourcing Management

As a cross-cutting theme, the Outsourcing management Dir the Possibility to create complex and interlocking elements of the ITsafety and thus to get to know an overarching understanding of develop From the structure of the
written order, through the processes

processes to the controls

we cover all areas.

Individual data processing

Due to high criticality of processed information, you will ensure in individual data processing that self-developed tools of the banking and insurance industry, e.g. based on Excel or even Python, to protect and manage.

Information Risk Management

In information risk management you identify risks and the measures to be protective crown jewels in IT. Here we define risk-reducing measures and create processes for management of risks. In doing so, we create a
Risk culture and awareness for

dealing with risks in IT.

OUR METHODOLOGICAL BASIS


Project management forms

the basis of our daily

work and provides us with the

tools to do this efficiently.
master. As methodical
ability it therefore complements

our professional

focus topics.



THAT MAKES US

FROM

What do we value?


We attach importance to a good and honest cooperation, because

we are team players! That means we watch each other’s backs, give honest

each other’s backs, give honest feedback and support

each other.


At our company, everyone takes on small internal

shows initiative and commitment and thus contributes to the

contribution to the further development of our team and ADWEKO.

What distinguishes us in the

IT security management out?


Our ITSM team, built up at ADWEKO since 2021, consists of a colorful mix of

experienced professionals and young guns, who work together on the

work on the topics of IT security.


Through a planned,

prudent and firm view of our goals, we lay the foundation for our

the foundation stone of our success, without losing sight of the fun.

without losing sight of the fun.

How do we work?

Whether at the customer or internally, we always give our all. In addition to professional competence, we always willingness to help, “going the extra mile”, is always in the foreground. Cooperation is the name of the game.

Mutual trust in each other’s abilities forms the foundation the cornerstone of success, because with us you can rely on everyone on everyone, both personally and professionally.


We attach importance to a good and honest cooperation, because

we are team players! That means we watch each other’s backs, give honest

each other’s backs, give honest feedback and support

each other.


At our company, everyone takes on small internal

shows initiative and commitment and thus contributes to the

contribution to the further development of our team and ADWEKO.


Our ITSM team, built up at ADWEKO since 2021, consists of a colorful mix of

experienced professionals and young guns, who work together on the

work on the topics of IT security.


Through a planned,

prudent and firm view of our goals, we lay the foundation for our

the foundation stone of our success, without losing sight of the fun.

without losing sight of the fun.

Whether at the customer or internally, we always give our all. In addition to professional competence, we always willingness to help, “going the extra mile”, is always in the foreground. Cooperation is the name of the game.

Mutual trust in each other’s abilities forms the foundation the cornerstone of success, because with us you can rely on everyone on everyone, both personally and professionally.

cross-sectional work on consulting areas

The protection of information and the security of IT is a cross-cutting issue in IT management. In addition to the specialist disciplines such as IAM and outsourcing, the
IT Security Management overarching requirements for IT such as the establishment of a
governance
-structure or the management of information risks.

Accordingly work We work with all IT departments and the business on a daily basis. Together with our partners within the X1F, such as Matrix, we cooperate very closely to provide our
We are able to offer our customers IT security from a single source, whereby we take over the project-based implementation of IT security requirements and our colleagues take over the secure operation of the IT in the long term.

operation of the IT.

CURRENT ITSM-NEWS

We had a 44 IT exam

ADWEKO becomes 360° provider for compliance issues with X1F

The 7th MaRisk Amendment – What Changes in IT Security Management?

VAIT amendment published

OPEN POSITIONS

data-filter-orgunit-selected="It-security-management" data-list-jobs-per-page="5" data-filter-company-hidden="true" data-filter-category-hidden="true" data-filter-location-hidden="true" data-filter-targetgroup-hidden="true" data-filter-language-hidden="true" data-filter-orgunit-hidden="true" data-filter-keyword-hidden="true" data-url=https://adweko.dvinci-hr.com/jobPublication/list.json data-skin="adweko" lang="en">

Monthly

ITSM Regulatory Update

ITSM Regulatory Update | November 2022

Talk to

Dominique.

Image by Dominique Tadayeski