intersoft consulting services AG

intersoft consulting services AG

Speciality: Comprehensive Internal and External Penetration Testing

Hamburg, Germany 92 employees
[01] About

IT services and consulting company based in Hamburg, Germany, with 48 employees and 12.2% YoY growth; specializes in data protection, IT security, and IT forensics, offering penetration testing services with experienced pentesters and recognized standards; active in industry events and social media.

intersoft consulting ist ein spezialisiertes Beratungsunternehmen in den Bereichen Datenschutz, IT-Sicherheit und IT-Forensik. Seit über einem Jahrzehnt unterstützen wir mit unseren Standorten Hamburg, Berlin, München, Stuttgart und Köln sehr erfolgreich kleine Unternehmen, Mittelständler sowie große internationale Konzernverbünde mit pragmatischen und sicheren Handlungsempfehlungen. Datenschutz: Als einer der führenden Dienstleister im Bereich Datenschutz stellen wir bundesweit externe Datenschutzbeauftragte, beraten nationale und international tätige Unternehmen in allen Belangen, auch zu Spezialfragen der DSGVO, für die erfolgreiche Umsetzung Ihrer Maßnahmen. Wir etablieren eine Datenschutzorganisation im Unternehmen und finden passgenaue Handlungsempfehlungen für Ihren Bedarf. Unsere Datenschutzberater sind Juristen mit IT-Know-how, die über einen enormen Wissens- und Erfahrungsschatz verfügen. IT-Sicherheit: Effektive Informationssicherheit ist ein Prozess, der sowohl technische Faktoren, infrastrukturelle Gegebenheiten als auch organisatorische und personelle Aspekte umfasst. Als zertifizierte IT-Sicherheits-Experten für branchenunabhängige Standards wie die ISO 27001, ISO 27001 auf der Basis von IT-Grundschutz bis hin zu branchenrelevanten Richtlinien wie VDA ISA/TISAX, VdS 10000, VAIT unterstützen wir Sie qualifiziert und vielfältig mit viel Erfahrung und praxiserprobten Lösungen. IT-Forensik: Unser Team an zertifizierten IT-Forensikern unterstützt Sie bei einem IT-Sicherheitsvorfall schnell und sicher – ob vor Ort oder Remote. Dabei achten wir auf eine sichere Wiederinbetriebnahme um die Ausfallzeiten so gering wie möglich zu halten. Alle digitalen Spuren werden zu jeder Zeit gerichtsfest von uns gesichert, dokumentiert und analysiert. Zudem bieten wir Ihnen durch die präventive IT-Forensik technische und organisatorische Maßnahmen, um bestens auf einen IT-Notfall vorbereitet zu sein.
[02] Services
Provides Services In Data Protection
IT Security Consulting
IT Forensics Including Incident Response
Penetration Testing
Vulnerability Assessments.
[03] Certifications
ISO 9001

ISO 9001 and Cybersecurity/IT


Origin


ISO 9001 is a quality management system standard developed by the International Organization for Standardization (ISO), first published in 1987. However, it's important to note that ISO 9001 itself is not a cybersecurity or IT-specific certification—it's a general quality management standard applicable to any industry. For cybersecurity and IT specifically, ISO created ISO/IEC 27001 in 2005, which focuses on information security management systems. ISO 9001 was created to establish consistent quality management practices across organizations worldwide, while ISO/IEC 27001 was developed to address the growing need for standardized information security controls.


Industry Value


ISO 9001 is valued across industries for demonstrating an organization's commitment to quality, customer satisfaction, and continuous improvement, which can indirectly support IT operations. For actual cybersecurity and IT security certification, ISO/IEC 27001 is the recognized standard, valued because it provides a systematic approach to managing sensitive information, demonstrates due diligence to clients and stakeholders, and is often required for government contracts or business partnerships. ISO/IEC 27001 certification signals that an organization has implemented internationally recognized security controls and risk management processes, making it essential for building trust in an increasingly security-conscious business environment.

ISO 27001

ISO 27001: Information Security Management Certification


Origin


ISO 27001 was developed by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), and was first published in 2005. It evolved from the British Standard BS 7799-2, which was created in the late 1990s. The standard was developed in response to the growing need for organizations to systematically manage and protect sensitive information in an increasingly digital business environment. ISO 27001 has since been revised, with major updates released in 2013 and 2022 to address evolving cybersecurity threats and best practices.


Industry Value and Importance


ISO 27001 is globally recognized as the leading standard for information security management systems (ISMS) and is valued for providing a systematic, risk-based approach to protecting sensitive data. Organizations that achieve ISO 27001 certification demonstrate to clients, partners, and regulators that they have implemented comprehensive security controls and are committed to maintaining confidentiality, integrity, and availability of information. The certification is particularly important for organizations handling sensitive data, as it helps meet regulatory compliance requirements, reduces security incidents, builds customer trust, and often provides a competitive advantage in procurement processes where information security assurance is required.

ISO 27701

ISO 27701: Privacy Information Management


Origin


ISO 27701 was developed by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), published in August 2019. The standard was created in response to the growing global emphasis on data privacy regulations, particularly following the implementation of the European Union's General Data Protection Regulation (GDPR) in 2018. It extends the existing ISO 27001 and ISO 27002 information security standards by adding specific requirements and guidance for establishing, implementing, maintaining, and continually improving a Privacy Information Management System (PIMS).


Industry Value and Importance


ISO 27701 certification is highly valued because it demonstrates an organization's commitment to protecting personal data and complying with privacy regulations worldwide. The standard provides a framework that helps organizations meet diverse privacy law requirements across different jurisdictions, reducing compliance complexity and legal risk. For businesses handling personal information, certification serves as a competitive differentiator, building trust with customers, partners, and regulators. It also streamlines audit processes by providing a unified approach to privacy management that integrates seamlessly with existing information security practices, making it particularly attractive to multinational organizations seeking to demonstrate accountability and privacy governance maturity.

CISA (certified Information Systems Auditor)
CIPP-E
CIPM
CISSP

CISSP Certification Overview


Origin


The Certified Information Systems Security Professional (CISSP) was created by the International Information System Security Certification Consortium, commonly known as (ISC)², in 1994. The certification was developed in response to the growing need for a standardized, vendor-neutral credential that could validate the expertise of information security professionals. (ISC)² designed the CISSP to establish a common body of knowledge for the cybersecurity field and provide a benchmark for measuring professional competence in information security.


Industry Value


The CISSP is widely regarded as one of the most prestigious and recognized certifications in cybersecurity, often required or preferred for senior-level security positions. Its value stems from its comprehensive coverage of eight security domains, including security operations, asset security, and security architecture, which demonstrates a candidate's broad expertise across the entire security landscape. The certification is accredited to ISO/IEC Standard 17024 and meets U.S. Department of Defense Directive 8570 requirements, making it particularly valuable for government contractors and enterprise organizations. Employers value CISSP-certified professionals because the rigorous examination process and experience requirements (minimum five years) ensure holders possess both theoretical knowledge and practical experience in managing and implementing security programs.

GIAC Certified Forensic Examiner (gcfe)
GIAC Certified Incident Handler (gcih)
GIAC Penetration Tester (gpen)
GIAC Certified Forensic Analyst (gcfa)
GIAC Network Forensic Analyst (gnfa)
GIAC Defending Advanced Threats (gdat)
GIAC Cloud Penetration Tester (gcpn)
GIAC Battlefield Forensics And Acquisition (gbfa)
GIAC Cloud Forensics Responder (gcfr)
BSI Recognized Apt-response Service Provider
UN Global Compact
[05] Notable Clients
  • Danone GmbH
  • Panasonic Electric Works Europe AG
  • ŠKODA AUTO Deutschland GmbH
  • Yamaha