IT Security
We understand our Business and IT partners needs to protect DB SCHENKER information assets.
We identify and mitigate IT Risks. We prevent unauthorized use, modification, and destruction of enterprise data or IT services.
We focus on four areas:
- IT security architecture: We help to design robust solutions from IT security perspective. We also help to verify whether existing IT solutions are not creating cyber security threats to the organization.
- IT security Rrsk management: We help to identify and prioritize IT security risks. We ensure that IT security risks are clearly documented and their owners understand what actions are required to mitigate them.
- IT Pen-Testing (“Red-Team”): We constantly challenge IT security controls using our hacker like mindsets and tools. Our goal is to demonstrate risks and increase security level of our organization.
- IT security toolbox: We support IT Security operational processes and platforms including vulnerability management, security awareness, and IT risk management. We also prepare management reporting in the IT Security area.