aschuster4you

About Andreas Schuster

Als Experte für Informationssicherheit / Informationssicherheits-Managementsysteme (ISMS), IT-Sicherheit, Authentifizierung, sowie PKI und Verschlüsselung verfügt er über mehr als 20 Jahre technische Erfahrung in Serverinfrastruktur sowie Unternehmensnetzwerkarchitektur. Seine ausgezeichneten Kenntnisse in ISO 27001 und ISA 6 / TISAX ermöglichen es ihm, Kunden in NIS2 Umsetzungen und bei InfoSec Zertifizierungsprozessen effektiv zu unterstützen. Zudem ist er hervorragend mit europäischen Zertifizierungsstellen vernetzt.

free ISMS gra­phic: Cloud

"Cloud" - for your ISMS we are happy to provide our free and royalty-free graphic. Use the "Save graphic as" function of your browser to use this pictogram for your information security system. Figure: Cloud With this pictogram you can create understandable user policies, which are required for an ISMS according to ISO/IEC [...]

By |2022-11-06T09:47:16+01:0013.11.2019|ISMS tools|

free ISMS gra­phic: Sto­rage Server

"Storage Server" - for your ISMS we are happy to provide our free and royalty-free graphic. Use the "Save graphic as" function of your browser to use this pictogram for your information security system. Figure: Storage Server With this pictogram you can create understandable user policies, which are required for an ISMS according [...]

By |2022-11-06T09:47:23+01:0013.11.2019|ISMS tools|

free ISMS gra­phic: Sto­rage note­book encrypt­ed — ser­ver encrypt­ed with 2FA

"Storage notebook encrypted - server unencrypted with 2FA" - for your ISMS we are happy to provide our free and royalty-free graphic. Use the "Save graphic as" function of your browser to use this pictogram for your information security system. Figure: Storage notebook encrypted server encrypted with 2FA With this pictogram you can [...]

By |2022-11-06T09:47:28+01:0013.11.2019|ISMS tools|

free ISMS gra­phic: Sto­rage note­book encrypt­ed — ser­ver encrypted

"Storage notebook encrypted - server encrypted" - for your ISMS we are happy to provide our free and royalty-free graphic. Use the "Save graphic as" function of your browser to use this pictogram for your information security system. Figure: Storage Notebook encrypted Server encrypted With this pictogram you can create understandable user policies, [...]

By |2022-11-06T09:47:35+01:0013.11.2019|ISMS tools|

free ISMS gra­phic: Sto­rage note­book encrypt­ed — ser­ver unencrypted

"Storage notebook encrypted - server unencrypted" - for your ISMS we are happy to provide our free and royalty-free graphic. Use the "Save graphic as" function of your browser to use this pictogram for your information security system. Figure: Storage notebook encrypted - server unencrypted With this pictogram you can create understandable user [...]

By |2022-11-06T09:47:41+01:0013.11.2019|ISMS tools|

free ISMS gra­phic: Per­mit­ted processing

"Permitted processing" - for your ISMS we are happy to provide our free and royalty-free graphic. Use the "Save graphic as" function of your browser to use this pictogram for your information security system. Figure: Allowed processing With this pictogram you can create understandable user policies, which are required for an ISMS according [...]

By |2022-11-06T09:47:47+01:0013.11.2019|ISMS tools|

free ISMS gra­phic: Mar­king Internal

"Marking Internal" - for your ISMS we are happy to provide our free and royalty-free graphic. Use the "Save graphic as" function of your browser to use this pictogram for your information security system. Figure: Classification marking internal With this pictogram you can easily mark documents and create understandable user policies, which are [...]

By |2022-11-06T09:47:52+01:0013.11.2019|ISMS tools|

free ISMS gra­phic: Mar­king Restricted

"Marking Restricted" - for your ISMS we are happy to provide our free and royalty-free graphic. Use the "Save graphic as" function of your browser to use this pictogram for your information security system. Figure: Classification Marking Restricted With this pictogram you can easily mark documents and create understandable user policies, which are [...]

By |2022-11-06T09:47:59+01:0013.11.2019|ISMS tools|
Go to Top