Deutsch → to Mainsite →

creating
digital
excellence

We support our clients in securing their firms and maintaining their leading market positions. Today’s ongoing digital transformation calls for new business models, production methods, and shrinking innovation cycles to all meet the highest security standards.

We develop robust and sustainable digitization strategies and successfully implement them with our clients. Solutions for digital security and compliance concepts are integral building blocks of these strategies.

Digital Strategy

Today’s rapid digitization requires companies to undergo an extensive transformation to ensure competitiveness. To master that, an appropriate, concrete, and feasible plan is necessary. To guide this process, com I code works out a holistic digitization strategy with the client. This far-reaching task is carried out in iterative steps that encompass all relevant areas of the firm accordingly.

Digital Security Strategy

Securing internal digital infrastructures and applications is key to a firm’s future success. Together with our clients, we develop an appropriate security strategy, which acts as the linchpin for the implementation of digital security across the firm. The security strategy is derived directly from the overall corporate strategy and the ongoing, inevitable digitization of the firm.

Digital Architecture

Every digitization strategy needs a resilient and flexible technical basis. This includes robust, modular, and dynamic IT infrastructures and seamlessly integrated applications that act as the enabling basis of digital innovation in the firm. A change in IT architecture is part of a firm’s digital transformation and is implemented by us with our clients in an achievable manner.

Digital Security Architecture

Just like the overarching digitization strategy, a specific digital security strategy also requires a resilient and flexible technical basis. The security solutions must integrate seamlessly into the IT infrastructure and application architecture. The first step towards an implementable security architecture is the development of a "big picture" with a holistic end-to-end approach. Based on that, architecture modules are created that also include production / smart factory security, SIEM / threat management, IAM etc.

Digital Management

A deliberate IT architecture can only generate high quality benefits for a firm if the service management and operating processes are well designed, implemented in applications, and continuously optimized as part of steady improvement. The quality of processes and methods of IT management also determines how secure and economical the digital services and infrastructures are. To realize this, we implement successful IT service and operations management concepts and structures with our clients.

Digital Security Management

Digital security is a process, not a project! In order to establish these processes within a firm in a feasible manner, we offer customized services and support starting with the initialization of security concepts all the way to continuous improvements. Together with our clients, we implement cyber risk assessments, security audits, and the introduction and operation of management systems (ISMS, Tisax, ISO 27001). Security operations are further solidified with topics like security operations centers (soc) and security incident response.

Crafted Security InnerCircle Events
Outlook 2023

On the cyber frontline - insights into 24 months of Incident Response

For the past two years, ComCode has been in the midst of serious cyber-attacks on internationally operating German companies. This InnerCircle event gives concrete insights on "why" and "how" attacks happen and how companies - in totally different scenarios and industries - have responded to them.

Cyber Shield for Businesses

What can and must companies do to defend themselves against devastating attacks and, when they happen, to respond appropriately. In this InnerCircle event, Security Operations / SIEM approaches will be presented and discussed based on experiences and live examples from projects in this realm.


The events will take place according to current Covid safety guidelines.

Current Topics 2022

Security Incident Response Leadership in large-scale incident response cases & business recoveries
Digitization Concepts & IT Governance Digital strategies
Transformation of IT-organization
IT service management
Open Source Intelligence OSINT analysis
Risk analysis
Anti-OSINT
Identity & Access Management / Identity Governance Concepts
Tendering
Project management
Cyber Security Operations & Threat Intelligence Set up and operation of security operations center (SOC) internal / external
Security monitoring & SIEM
Security incident response
Cloud Security (Focus on Office 365 and Azure) Security concepts & architectures
Security reviews & analysis
Introduction ISMS & Certification ISO on demand (external Information Security Officer) Assessment & risk analysis
Implementation VDA ISA / ISO 27001

Partnerships

Champlain College, USA Munich Cyber Security Program
www.champlain.edu
www.mcsp.one
LabCampus at the Munich Airport Strategic projects based on Terminal TestLab
More Info
Press
Digitale Sicherheit für den Mittelstand eG Founding Member
www.digitale-sicherheit-mittelstand.de
College of Applied Sciences Mittweida Collaborations in Open Source Intelligence (OSINT) and Digital Forensics projects
www.hs-mittweida.de

To master the challenges of digitization, human and financial resources are necessary. Through working closely with the client, com|code ensures that they are used with maximum efficiency. The focus of the digitization and security consulting is always aligned with the individual needs of the company.

Founded in 2009, com|code provides competent services and solutions for mid-sized and large enterprises.

(+49) 8142 - 440 21 80
kontakt@comcode.de