Do IT with PASSION

About ILIAS IT-Advisory

Protect your company from the growing cyber security risks - with us at your side! We strengthen your awareness and cyber resilience and ensure that your IT landscape, digital assets and employees are fully protected. Put your trust in our experience and expertise - protect what's important to you!

Specialist focus topics

Benefit from our many years of consulting expertise in the international corporate environment to take your cyber security to the next level

  • Cyber Security
  • Information Security
  • Data Loss Prevention
  • ISO 27001 ISMS-Audits
  • CyberSec-Regulations
  • CyberSec-Awareness
  • Management Reporting
  • Enterprise Governance
  • Service Management
  • Risk Management
  • Project Management
  • Process Management
  • Business Intelligence
  • Artificial Intelligence
Our approach
about
image

Customised consulting

Our consulting approach

In our consulting, we always address your specific business environment as well as your individual initial situation and objectives

  • Joint initial consultation
  • Determination of the current initial situation
  • Exploration of customer-specific requirements
  • Analysis of deviations or gap
  • Development of action and measure plan
  • Implementation of the action plan
  • Review/assessment of effectiveness
Our services

Do IT with EXPERTISE

Our consultancy services

We support you professionally and competently in the following areas as part of our IT consultancy services:

Cyber Security

Cyber Security

Consultancy for the planning and implementation or auditing of an information security management system based on the ISO/IEC 27001 standard.

IT Service Management

IT Service Management

Consultancy for the planning and implementation or auditing of an IT service management system based on the ISO/IEC 20000 and ITIL standards.

IT Governance

IT Governance

Consultancy on the establishment of governance structures, principles and processes to support overarching business objectives and avoid risks.

IT Risk Management

IT Risk Management

Consulting and support in the identification and assessment of risks as well as planning and implementation of proactive countermeasures for risk treatment.

IT Expert Assessment

IT Expert Assessment

Expert support and expert advice as well as preparation of objective and reliable IT expert opinions in order to objectively illuminate specific issues and facts.

IS Management Reporting

IS Management Reporting

Consultancy and support for planning, establishing and introducing an automated senior management reporting solution based on thorough an well-defined KPIs and KCIs.

Trust our expertise

Contact us now

Schedule a consultation today

Consultation Contact form

Do IT with SKILLS

Our skills

We combine highly specialised knowledge with practical skills to solve individual problems and implement complex projects.

1. Management systems, frameworks, standards, regulation

95%

2. Technology, infrastructure, server and desktop systems

90%

3. Data structures, databases, data formats, interfaces

90%

4. Artificial intelligence, workflows, agents, process automation

95%
video-img

0-Day, DDoS, C2C & Zombies

Cyber Security Key Figures

Over the last few years, cyber attacks have become increasingly sophisticated and complex. The key figures determined by Symantec, Sophos and EY speak for themselves and illustrate the scope of the current threat situation.

265 billion $

of the predicted total annual costs up to 2031 caused by ransomware cyber attacks on companies

74%

of attacks to take over personal or business user accounts start with sophisticated phishing campaigns.

350+ Mio

People were affected by compromised records containing personally identifiable information (PII) or sensitive information in 2023

10.5 Bil $

Total estimated global cost of accumulated financial losses caused by organised cybercrime through 2025

Do IT with PROFESSIONALS

Our Team

As ambitious cybersecurity and IT experts, we always act professionally, purposefully and solution-orientated in order to provide you with the best possible support for your demanding challenges.

Do IT with SUCCESS

Our project references

With over 20 years of professional experience in the IT sector, we have extensive know-how and expertise in a wide range of areas - you can rely on us!

HSBC Continental Europe S.A.

  • 04/2021 - 12/2024
  • DLP Project Manager in the field of cybersecurity (Digital Business Services)
  • Planning, design, migration and operationalisation of a DLP solution.
  • Project management, IT service management, infrastructure and server management
  • Cyber security, information security, data security, audit corrective measures
  • Symantec DLP, Win Server 2019, RHEL8, Oracle 19c, IBM QRadar, Splunk SOAR
  • Audit, Risk, Compliance, Datenschutz, Cyber Engineering, ITSM, BCM

Deutsche Bank AG, CSO

  • 05/2015 - 11/2018
  • ISMR Project Manager in the field of cybersecurity (Chief Security Office)
  • Automation and technical project management of organisation-wide information security management reporting for the Chief Security Office
  • Project management, information security, security controls, KCI/KPI reporting
  • Information Security Governance, Regulatory, Frameworks, Standards, Policies
  • SharePoint, VBA, MS Excel, MS PowerPoint, Power Query, MS PowerBI, Tableau
  • InfoSec Risk, Internal Audit, Regulatory Response Team, Cybersecurity SMEs

Deutsche Bank AG, CTO

  • 04/2011 - 05/2015
  • Global UAT Test Manager in the Service Transition (Validation & Testing) department
  • Planning, implementation, coordination, monitoring and control of global user acceptance tests as well as technical management of a test team
  • Requirements and test management, process management, validation
  • IT Service Management, Change Evaluation, Production Deployment
  • SharePoint, HP ALM, OS Builds, Citrix, VDI, VPN, RAS, MDM, Core Releases
  • Windows/Core Platform Engineering, Release & Deployment Management

Deutsche Bank AG, EOC

  • 01/2010 - 04/2011
  • Senior Technician in Service Operations (European Operation Centre)
  • Serveradministration und 2nd-Level-Support für Windows Server im 24/7 European Operation Center (zentraler WinTel EMEA Service Desk)
  • Server provisioning, app support, monitoring, change implementation
  • IT Service Management, Incident Management, Request Fulfillment
  • SharePoint, HP ALM, OS Builds, Citrix, VDI, VPN, RAS, MDM, Core Releases
  • Wintel/UNIX Teams, Database Admins, Storage Support, Virtualization

Read More
img

Provadis Partner für Bildung

  • 02/2022 - derzeit
  • IT security lecturer/trainer for IT specialists
  • Practical and interactive classroom course on cyber and IT security
  • Frontal teaching, knowledge transfer, group work, exercises
  • Cyber security, information security, data protection, BSI IT-Framework
  • VMware ESXi, Kali Linux, Metasploit Framework, Wireshark, Nmap, Hash Cat

Hochschule Fresenius

  • 09/2020 - 03/2024
  • IT-Security Dozent für Wirtschaftsinformatiker
  • Teaching of the IT security module in accordance with the official curriculum
  • Knowledge transfer, lectures, exam preparation, exam assessment
  • IT security, governance, risk management, legislation, standards, frameworks
  • ILIAS Online-Portal, Kollaborations-Tools, Online-Meetings (WebEx, Zoom)

Read More
img

Bundesnetzagentur

  • 02/2024 - derzeit
  • Cybersecurity Fachbegutachter
  • Assessment of Notifying Bodies with regard to cybersecurity requirements
  • On-site inspections, document reviews, technical discussions, expert opinions
  • Radio Equipment Directive (RED) 2014/53/EU
  • Expert procedures and methods and interview techniques

Read More
img

Deutsche Telekom AG

  • 07/2007 - 11/2010
  • Fachinformatiker, Fachrichtung Systemintegration (FISI)
  • Second IT vocational training programme in the dual system with several work placements and an international assignment at DB Schenker in Toronto
  • End user support, rollouts, data centre support, installation, relocations and changes
  • Incident Management, Troubleshooting, Request Fulfillment, Patching
  • Remedy ARS, Microsoft SCCM, Windows Server 2003, Windows 2000/XP
  • T-Systems GmbH, T-Mobile Deutschland GmbH, DB Schenker Canada Ltd.

Read More
img

Do IT with KNOW-HOW

Our Certifications

As experts in cyber security and IT service management, we hold the following internationally recognised IT certifications in addition to our many years of professional experience:

Do IT with SYSTEM

Our working method

In our consulting projects, we follow a process-based approach and orientate ourselves on the Deming cycle, which aims to manage service lifecycles and processes according to the PDCA cycle (Plan-Do-Check-Act).

Plan

Planning

  • Goal / process definition
  • Problem identification
  • Action planning

DO

Execution

  • Implement measures
  • Organisational aspects
  • Step-by-step piloting

Check

Verification

  • Check results
  • Target/result comparison
  • Root cause analyses

Act

Correction

  • Corrective actions
  • Standardisations
  • Planning next cycle

Do IT with ANSWERS

Questions and answers

Below you will find answers to carefully selected questions that we have been asked frequently in recent months.

According to current cyber security forecasts and analyses, companies will primarily have to deal with the following risks in 2025:
01. AI-assisted phishing and social engineering attacks
02. Ransomware: AI-driven and multi-extortion
03. Supply chain attacks by third-party providers
04. Cryptocurrency theft and misuse of stolen access data
05. Security vulnerabilities in the cloud, API and IoT
06. Insider threats
07. Prompt injection and AI model manipulation
08. Quantum-secure cryptography (post-quantum security)
09. Geopolitical & state-sponsored attacks
10. Regulatory pressure, compliance complexity and skills shortages
In 2025, private individuals will face a growing range of cyber risks, which will be massively exacerbated by the use of artificial intelligence, the increasing digitalisation of everyday life and organised cybercrime.

01. AI-supported phishing & social engineering
02. Identity theft & misuse of personal data
03. Mobile malware & spy apps
04. Insecure smart home devices & IoT
05. Ransomware & blackmail of private individuals
06. Psychological manipulation & scams
07. Deepfakes & reputation damage
08. Data loss through cloud and account hacks
09. Biometric risks
10. Surveillance & loss of data protection through platforms
In the context of cybersecurity, there are a number of issues that must be considered both strategically and operationally. These issues relate to technical, organisational, legal and human aspects:

1. Technical security controls and measures
2. Organisational and governance issues (GRC)
3. People & behaviour (social engineering & awareness)
4. Artificial intelligence and new technologies
5. Asset, data & information security
6. Threat and vulnerability management
7. Security operations & incident response
8. Legal and regulatory requirements
There are many good reasons why companies and individuals should consult specialised cybersecurity experts. In an increasingly digitalised world where threats are becoming ever more sophisticated, it is virtually essential to draw on specialised skills and expertise as well as practical experience in order to ensure comprehensive digital security.
Yes, it is possible to use our IT and cyber security consulting services on an hourly basis, with billing per hour or part thereof. You are welcome to use our YouCanBookMe calendar (see below) to book a personal consultation.
Yes, you can hire us for longer-term project assignments (e.g. 6–12 months) in your company as external support. The assignment is usually based on a corresponding project contract and a purchase order placed by your human resources (HR) department. Depending on your requirements, the assignment can be handled either through a general contractor (master vendor) or a preferred recruitment agency of your choice, or by direct assignment.

Trust our expertise

Contact us now

Schedule a consultation today

Consultation Contact form