Dr.techn. Margareth Stoll
Your reliable Consulting Partner & Auditor
Dr. Margareth Stoll
Consulting
Theodor Christomannosstraße, 33
39012 Meran South Tyrol / Italy
VAT Identification Number: IT02980320218
NIS
Information Security 27001
Cybersecurity
Business Continuity
©Dr. Margareth Stoll
For 30 years, we have been supporting companies, authorities and critical infrastructures of all sizes with proven, customized solutions.
Our pragmatic approach creates sustainable added value and promotes fast results.
Information Security light
NIS Cybersecurity
Support for individually selected focus areas by you
Support for the Implementation of national NIS legislation & for the Protection of critical infrastructures
ISMS
Information Security Management System
BCM
Business Continuity Management
Introduction and maintenance of an ISMS according to
ISO 27001 and/or Tisax, as well as complementary standards such as ISO 27701 Data Protection, ISO 27018 Cloud Security and industry-specific standards such as ISO 27019 Energy etc.
Introduction and maintenance of a BCM according to ISO 22301, BSI Standard 200-4
Focus areas for your sustainable Security & Resilience
Benefit from our interdisciplinary approach and proven integrated methods to promote operational reliability, protect knowledge &data and strengthen your sustainable success.
NIS 2.0 Management Training: •Legal requirements & liability •Incident response •Promoting security awareness & sustainable security culture
Governance : Development and management of strategic •Security objectives and/or •BCM objectives
Audit & Gap Analysis: Practical recommendations help you proactively exploit opportunities & identify strengths.
Training & Awareness: Customized hands-on training provides essential knowledge and ensure swift implementation.
Business Impact Analysis, Risk Analysis &
Security Measures:
Together, we analyze impacts and risks and integrate preventive measures into proven processes for efficient & sustainable implementation.
Organization: Establishing clear structures, responsibilities, and tasks
Policy management: Establishment & development of customized security policies
Supplier management: Promoting supply chain security & resilience by •Establishing requirements
•Selecting & controlling suppliers •Conducting Supplier audits
Continual system improvement & changes: We support the continual adaptation to new cyber threats, technologies and requirements.
Incident, Emergency & Crisis management:
•Developing Resilience strategies & Emergency plans
•Supporting Emergency and Crisis exercises
Compliance: Introduction, analysis &
continual adaptation
Get in touch