[av_section color=’main_color’ custom_bg=” src=’https://www.activemind.de/wp-content/uploads/activeMind-titel02web.jpg’ attachment=’8325′ attachment_size=’full’ attach=’parallax’ position=’top center’ repeat=’stretch’ video=” video_ratio=’16:9′ min_height=’custom’ min_height_px=’320px’ padding=’default’ shadow=’no-shadow’ bottom_border=’no-border-styling’ id=”]

[av_heading heading=’External IT security officer
for your company in Germany’ tag=’h1′ style=’blockquote modern-quote’ size=” subheading_active=” subheading_size=’18’ padding=’0′ color=’custom-color-heading’ custom_font=’#ffffff’][/av_heading]

[/av_section][av_three_fifth first]

[av_textblock size=” font_color=” color=”]
The introduction and implementation of an IT security management system (ISMS) to ensure corporate data security is only possible with the appropriately qualified IT security officers (i.e. data security officials). These professionals in particularly are rare commodities on the market or cannot be sufficiently utilized in order to justify a permanent position. Therefore, for most companies (in Germany), the appointment of an external IT or data security officer is advisable.

Duties of an external IT security officer

As a general rule, the IT security officer should represent a supervisory/control function for internal or external IT. Extensive technical and organisational know-how is required for this. However, employees as internal IT security officers will get operational tunnel vision after a certain period of time in the company. Via their work in different companies, external service providers have had comprehensive experiences and maintain a meaningful critical distance, which internal employees normally do not.

As an external IT security officer, the experts of activeMind AG assist you in carrying out the monitoring and advisory function in your company. This is how we make a significant contribution to your data security and, if requested, we’ll accompany you all the way to an ISO 27001 certification.

Cost of an external IT security officer

The expense for an external officer for information and IT security depends greatly the organizational and technical structures of your company. Together with you, we determine which ISMS fits best for your company on an individual basis. In general, we offer data security services as the following packages at the fixed price:
[/av_textblock]

[/av_three_fifth][av_two_fifth]
[av_textblock size=” font_color=” color=”]

Our IT experts

[/av_textblock]

[av_iconlist position=’left’ font_color=” custom_title=” custom_content=” color=” custom_bg=” custom_font=” custom_border=”]
[av_iconlist_item title=’Experienced auditors’ link=” linktarget=” linkelement=” icon=’ue8c9′ font=’entypo-fontello’]
The activeMind AG experts are licensed and active auditors for ISO 27001 (TÜV Hessen) [Technical Control Association] and ISO 27001 based on IT protection of the Federal Office for Information Security [Bundesamt für Sicherheit in der Informationstechnik – BSI]. We know which certifications for companies are optimal and how to get them.
[/av_iconlist_item]
[av_iconlist_item title=’Optimised processes’ link=” linktarget=” linkelement=” icon=’ue894′ font=’entypo-fontello’]
The employees at activeMind AG possess self-developed training and inspection models, which have been tested over many years. We provide companies with immediate, compact reports with maturity levels, key figures and prioritisation for their to-do lists.
[/av_iconlist_item]
[av_iconlist_item title=’Technical expertise’ link=” linktarget=” linkelement=” icon=’ue8ab’ font=’entypo-fontello’]
The consultants at activeMind AG are capable of independently examining all technical aspects. With our comprehensive IT knowledge, we can identify and close possible security gaps directly on site.
[/av_iconlist_item]
[/av_iconlist]
[/av_two_fifth]

[av_table purpose=’pricing’ caption=” responsive_styling=’avia_responsive_table’]
[av_row row_style=’avia-heading-row’][av_cell col_style=”]

Data Security
Basis

[/av_cell][av_cell col_style=”]

Data Security
Business

[/av_cell][av_cell col_style=”]

Data Security
Management (ISO 27001)

[/av_cell][/av_row]
[av_row row_style=”][av_cell col_style=”][av_font_icon icon=’ue812′ font=’entypo-fontello’ style=” caption=” link=” linktarget=” size=’25px’ position=’left’ color=’#6bd620′][/av_font_icon] Compliance with the minimum requirements of data security[/av_cell][av_cell col_style=”][av_font_icon icon=’ue812′ font=’entypo-fontello’ style=” caption=” link=” linktarget=” size=’25px’ position=’left’ color=’#6bd620′][/av_font_icon] Compliance with the minimum requirements of data security[/av_cell][av_cell col_style=”][av_font_icon icon=’ue812′ font=’entypo-fontello’ style=” caption=” link=” linktarget=” size=’25px’ position=’left’ color=’#6bd620′][/av_font_icon] Compliance with the minimum requirements of data security[/av_cell][/av_row]
[av_row row_style=”][av_cell col_style=”][av_font_icon icon=’ue813′ font=’entypo-fontello’ style=” caption=” link=” linktarget=” size=’25px’ position=’left’ color=’#dd2727′][/av_font_icon] Conducting an internal
audit annually[/av_cell][av_cell col_style=”][av_font_icon icon=’ue812′ font=’entypo-fontello’ style=” caption=” link=” linktarget=” size=’25px’ position=’left’ color=’#6bd620′][/av_font_icon] Conducting an internal audit annually:
security audit[/av_cell][av_cell col_style=”][av_font_icon icon=’ue812′ font=’entypo-fontello’ style=” caption=” link=” linktarget=” size=’25px’ position=’left’ color=’#6bd620′][/av_font_icon] Conducting an internal audit annually:
ISO 27001 compliant[/av_cell][/av_row]
[av_row row_style=”][av_cell col_style=”][av_font_icon icon=’ue813′ font=’entypo-fontello’ style=” caption=” link=” linktarget=” size=’25px’ position=’left’ color=’#dd2727′][/av_font_icon] Support with ISO 27001 certification[/av_cell][av_cell col_style=”][av_font_icon icon=’ue813′ font=’entypo-fontello’ style=” caption=” link=” linktarget=” size=’25px’ position=’left’ color=’#dd2727′][/av_font_icon] Support with ISO 27001 certification[/av_cell][av_cell col_style=”][av_font_icon icon=’ue812′ font=’entypo-fontello’ style=” caption=” link=” linktarget=” size=’25px’ position=’left’ color=’#6bd620′][/av_font_icon] Support with ISO 27001 certification[/av_cell][/av_row]
[av_row row_style=’avia-button-row’][av_cell col_style=”][av_button label=’Request Basis’ link=’manually,https://www.activemind.de/en/data-security/it-security-official/#form’ link_target=” size=’medium’ position=’center’ icon_select=’yes’ icon=’ue875′ font=’entypo-fontello’ color=’theme-color’ custom_bg=’#444444′ custom_font=’#ffffff’]

[/av_cell][av_cell col_style=”][av_button label=’Request Business’ link=’manually,https://www.activemind.de/en/data-security/it-security-official/#form’ link_target=” size=’medium’ position=’center’ icon_select=’yes’ icon=’ue875′ font=’entypo-fontello’ color=’theme-color’ custom_bg=’#444444′ custom_font=’#ffffff’]

[/av_cell][av_cell col_style=”][av_button label=’Request Management’ link=’manually,https://www.activemind.de/en/data-security/it-security-official/#form’ link_target=” size=’medium’ position=’center’ icon_select=’yes’ icon=’ue875′ font=’entypo-fontello’ color=’theme-color’ custom_bg=’#444444′ custom_font=’#ffffff’]

[/av_cell][/av_row]
[/av_table]

[av_one_full first]

[av_toggle_container initial=’0′ mode=’accordion’ sort=”]
[av_toggle title=’Detailed services, data security packages: Basis, Business and Management (ISO 27001)’ tags=”]

Data Security
Basis
Data Security
Business
Data Security
Management
(ISO 27001)
Appointment of an IT security officer [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon]
Status report and meeting [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] 1 x annually [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] 1 x annually [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] 1 x annually
Training employees (any number) at the corporate headquarters [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] 1 x annually [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] 1 x annually [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] 1 x annually
Access to the online-training portal for a maximum of 50 employees [av_font_icon icon=’ue813′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#dd2727′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon]
Support on inquiries relevant to data security (any number) [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] Per inquiry ≤ 15 minutes [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] Per inquiry ≤ 30 minutes [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] Per inquiry ≤ 60 minutes
Conducting internal audits with reports [av_font_icon icon=’ue813′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#dd2727′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] security audit (1 x annually) [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] ISO 27001 compliant audit (1 x annually)
Inspection of data backup (server) [av_font_icon icon=’ue813′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#dd2727′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] 1 x annually [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] 1 x annually
Inspection of the firewall, remote access rules for a maximum of 25 rules [av_font_icon icon=’ue813′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#dd2727′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] 1 x annually [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] 1 x annually
Support with ISO 27001 certification audits [av_font_icon icon=’ue813′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#dd2727′] [/av_font_icon] [av_font_icon icon=’ue813′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#dd2727′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] Max. 5 days annually
Workshop creating a risk management system [av_font_icon icon=’ue813′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#dd2727′] [/av_font_icon] [av_font_icon icon=’ue813′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#dd2727′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon]
Risk analysis update [av_font_icon icon=’ue813′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#dd2727′] [/av_font_icon] [av_font_icon icon=’ue813′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#dd2727′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] 1 x annually
Creation of ISO 27001 SoA [av_font_icon icon=’ue813′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#dd2727′] [/av_font_icon] [av_font_icon icon=’ue813′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#dd2727′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon]
Draft security policy [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon]
Draft authorisation allocation guideline [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon]
Draft remote access guideline [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon]
Draft data backup guideline [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon]
Draft of a network plan up to 50 systems [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon]
Draft firewall guideline [av_font_icon icon=’ue813′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#dd2727′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon]
Draft virus protection guideline [av_font_icon icon=’ue813′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#dd2727′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon]
Draft risk management guideline [av_font_icon icon=’ue813′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#dd2727′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon]
Draft change management guideline [av_font_icon icon=’ue813′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#dd2727′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon]
Draft error management guideline [av_font_icon icon=’ue813′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#dd2727′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon]
Draft security incident guideline [av_font_icon icon=’ue813′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#dd2727′] [/av_font_icon] [av_font_icon icon=’ue813′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#dd2727′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon]
Draft use of corporate resources guideline [av_font_icon icon=’ue813′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#dd2727′] [/av_font_icon] [av_font_icon icon=’ue813′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#dd2727′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon]
Draft system logging guideline [av_font_icon icon=’ue813′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#dd2727′] [/av_font_icon] [av_font_icon icon=’ue813′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#dd2727′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon]
Draft communication guideline [av_font_icon icon=’ue813′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#dd2727′] [/av_font_icon] [av_font_icon icon=’ue813′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#dd2727′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon]
Draft guideline for roles and responsibilities in data security [av_font_icon icon=’ue813′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#dd2727′] [/av_font_icon] [av_font_icon icon=’ue813′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#dd2727′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon]
Central administration portal for regulations [av_font_icon icon=’ue813′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#dd2727′] [/av_font_icon] [av_font_icon icon=’ue813′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#dd2727′] [/av_font_icon] [av_font_icon icon=’ue812′ font=’entypo-fontello’ size=’25px’ position=’left’ color=’#6bd620′] [/av_font_icon]
[av_button label=’Request Basis!’ link=’manually,https://www.activemind.de/en/data-security/it-security-officer/#form’ link_target=” size=’medium’ position=’center’ icon_select=’yes’ icon=’ue875′ font=’entypo-fontello’ color=’theme-color’ custom_bg=’#444444′ custom_font=’#ffffff’] [av_button label=’Request Business!’ link=’manually,https://www.activemind.de/en/data-security/it-security-officer/#form’ link_target=” size=’medium’ position=’center’ icon_select=’yes’ icon=’ue875′ font=’entypo-fontello’ color=’theme-color’ custom_bg=’#444444′ custom_font=’#ffffff’] [av_button label=’Request Management!’ link=’manually,https://www.activemind.de/en/data-security/it-security-officer/#form’ link_target=” size=’medium’ position=’center’ icon_select=’yes’ icon=’ue875′ font=’entypo-fontello’ color=’theme-color’ custom_bg=’#444444′ custom_font=’#ffffff’]

[/av_toggle]

[/av_toggle_container]

[av_hr class=’custom’ height=’50’ shadow=’no-shadow’ position=’center’ custom_border=’av-border-thin’ custom_width=’100%’ custom_border_color=” custom_margin_top=’20px’ custom_margin_bottom=’1px’ icon_select=’no’ custom_icon_color=” icon=’ue808′ font=’entypo-fontello’]

[/av_one_full][av_three_fifth first]
[av_textblock size=” font_color=” color=”]

Form for a free inquiry

Simply send us a little information on your company so that we can create an individualized and unbinding offer for you. We will contact you immediately!
[/av_textblock]
[/av_three_fifth]

[av_contact email=’anfrage@activemind.de, foitzick@activemind.de’ title=’Please share the following information to receive a personal offer:’ button=’Send’ on_send=’redirect’ sent=’Ihre Nachricht wurde versendet!’ link=’manually,https://www.activemind.de/en/company/contact/confirmation-external-it-security-official/’ subject=’Anfrage IT-SB (ENGLISCH) über Website’ autorespond=’Thank you very much for your inquiry via our web form. We will contact you shortly.

Kind regards,
Your activeMind Team


activeMind AG Technologie und Management Beratung
Vorstand: Klaus Foitzick
Aufsichtsratsvorsitzender: Manfred Keßler
Potsdamer Str. 3
D-80802 München
Phone +49 / 89 / 418 560 170
Fax +49 / 89 / 418 560 179
HRB 135796 AG München’ captcha=’active’ color=”]
[av_contact_field label=’Title’ type=’select’ options=’Ms,Mr’ check=” width=’element_third’][/av_contact_field]
[av_contact_field label=’First name’ type=’text’ options=” check=’is_empty’ width=’element_third’][/av_contact_field]
[av_contact_field label=’Last name’ type=’text’ options=” check=’is_empty’ width=’element_third’][/av_contact_field]
[av_contact_field label=’Email’ type=’text’ options=” check=’is_email’ width=’element_half’][/av_contact_field]
[av_contact_field label=’Confirm email’ type=’text’ options=” check=’is_email’ width=’element_half’][/av_contact_field]
[av_contact_field label=’Company’ type=’text’ options=” check=’is_empty’ width=’element_half’][/av_contact_field]
[av_contact_field label=’Telephone number’ type=’text’ options=” check=” width=’element_half’][/av_contact_field]
[av_contact_field label=’Street / Number’ type=’text’ options=” check=” width=’element_third’][/av_contact_field]
[av_contact_field label=’Zip’ type=’text’ options=” check=” width=’element_third’][/av_contact_field]
[av_contact_field label=’City’ type=’text’ options=” check=” width=’element_third’][/av_contact_field]
[av_contact_field label=’Company website’ type=’text’ options=” check=” width=’element_half’][/av_contact_field]
[av_contact_field label=’How many employees does your comapany have?’ type=’text’ options=” check=’is_number’ width=’element_half’][/av_contact_field]
[av_contact_field label=’Do you currently manage your IT by yourself, or do you primarily use an external service provider?’ type=’select’ options=’Self-managed, Via a service provider’ check=’is_empty’ width=’element_half’][/av_contact_field]
[av_contact_field label=’Do you operate a central IT infrastructure in the company?’ type=’select’ options=’No,Yes’ check=’is_empty’ width=’element_half’][/av_contact_field]
[av_contact_field label=’Is the central IT infrastructure operated in Germany?’ type=’select’ options=’No, outside of Germany,Yes, in Germany’ check=’is_empty’ width=’element_half’][/av_contact_field]
[av_contact_field label=’Does your central IT infrastructure also administer other locations in and outside of Germany?’ type=’select’ options=’No, just one location,Yes, also other locations in Germany,Yes, also other locations outside of Germany,Yes, also other locations in and outside of Germany’ check=’is_empty’ width=’element_half’][/av_contact_field]
[av_contact_field label=’Is your company already certified according to a particular ISO standard? If applicable, please specify.’ type=’text’ options=” check=” width=”][/av_contact_field]
[av_contact_field label=’Please send us a personal message or include additional information in the space provided below.’ type=’textarea’ options=” check=” width=”][/av_contact_field]
[/av_contact]

[av_sidebar widget_area=’footer-referenzen’]