Do IT with passion

About ILIAS IT-Advisory

Protect your company from the growing cyber security risks - with us at your side! We strengthen your awareness and cyber resilience and ensure that your IT landscape, digital assets and employees are fully protected. Put your trust in our experience and expertise - protect what's important to you!

Specialist focus topics

Benefit from our many years of consulting expertise in the international corporate environment to take your cyber security to the next level

  • Cyber Security
  • Information Security
  • Data Loss Prevention
  • ISO 27001 ISMS-Audits
  • CyberSec-Regulations
  • CyberSec-Awareness
  • Management Reporting
  • Enterprise Governance
  • Service Management
  • Risk Management
  • Project Management
  • Process Management
  • Business Intelligence
  • Artificial Intelligence
Our approach
about
image

Customised consulting

Our consulting approach

In our consulting, we always address your specific business environment as well as your individual initial situation and objectives

  • Joint initial consultation
  • Determination of the current initial situation
  • Exploration of customer-specific requirements
  • Analysis of deviations or gap
  • Development of action and measure plan
  • Implementation of the action plan
  • Review/assessment of effectiveness
Our services

Do IT with EXPERTISE

Our consultancy services

We support you professionally and competently in the following areas as part of our IT consultancy services:

Information Security

Consultancy for the planning and implementation or auditing of an information security management system based on the ISO/IEC 27001 standard

1

IT Service Management

Consultancy for the planning and implementation or auditing of an IT service management system based on the ISO/IEC 20000 and ITIL standards

2

IT Governance

Consultancy on the establishment of governance structures, principles and processes to support overarching business objectives and avoid risks

3

IT Risk Management

Consulting and support in the identification and assessment of risks as well as planning and implementation of proactive countermeasures for risk treatment

4

IT Expert Assessment

Expert support and expert advice as well as preparation of objective and reliable IT expert opinions in order to objectively illuminate specific issues and facts

5

Artificial Intellligence

Consultancy and support for the planning, introduction and establishment of an automated senior management / stakeholder reporting system based on a key performance indicator system

6

Trust our expertise

Contact us now

Schedule a consultation today

Consultation Contact form

Do IT with SKILLS

Our skills

We combine highly specialised knowledge with practical skills to solve individual problems and implement complex projects.

1. Management systems, frameworks, standards, regulation

95%

2. Technology, infrastructure, server and desktop systems

90%

3. Data structures, databases, data formats, interfaces

90%

4. Artificial intelligence, workflows, agents, process automation

95%
video-img

0-Day, DDoS, C2C & Zombies

Cyber Security Key Figures

Over the last few years, cyber attacks have become increasingly sophisticated and complex. The key figures determined by Symantec, Sophos and EY speak for themselves and illustrate the scope of the current threat situation.

265 billion $

of the predicted total annual costs up to 2031 caused by ransomware cyber attacks on companies

74%

of attacks to take over personal or business user accounts start with sophisticated phishing campaigns.

350+ Mio

People were affected by compromised records containing personally identifiable information (PII) or sensitive information in 2023

10.5 Bil $

Total estimated global cost of accumulated financial losses caused by organised cybercrime through 2025

Do IT with PROFESSIONALS

Our Team

As ambitious cybersecurity and IT experts, we always act professionally, purposefully and solution-orientated in order to provide you with the best possible support for your demanding challenges.

Do IT with SYSTEM

Our working method

In our consulting projects, we follow a process-based approach and orientate ourselves on the Deming cycle, which aims to manage service lifecycles and processes according to the PDCA cycle (Plan-Do-Check-Act).

Plan

Planning

  • Goal / process definition
  • Problem identification
  • Action planning

DO

Execution

  • Implement measures
  • Organisational aspects
  • Step-by-step piloting

Check

Verification

  • Check results
  • Target/result comparison
  • Root cause analyses

Act

Correction

  • Corrective actions
  • Standardisations
  • Planning next cycle

Do IT with KNOW-HOW

Our Certifications

As experts in cyber security and IT service management, we hold the following internationally recognised IT certifications in addition to our many years of professional experience:

ISC² CISSP

CISSP (Certified Information Systems Security Professional) is a globally recognised de facto "gold standard" certification for experts in the field of information security.

BISG IT-Gutachter

As a certified IT expert/appraiser of the Bundesfachverband der IT-Sachverständigen und Gutachter e.V. we support you seriously, professionally and competently in your tasks.

ITIL Expert in ITSM

site.certifications.item3.text

ISO/IEC 27001 Auditor

Information Security Officer and Auditor Certification for the leading international standard for information security management systems (InfoSec Risk and Compliance Management)

ISO/IEC 20000 Auditor

Manager and Auditor certification for the leading international standard for IT service management consisting of requirements for an (IT) service management system and best practices

M_o_R Practitioner

M_o_R (Management of Risk) Practitioners help your organisation to identify, assess, control and mitigate or reduce risks at strategic, programme, project and operational levels

COBIT 5 Implementer

ISACA Control Objectives for Information Technologies - Optimising Governance of Information and Technology (EGIT).

PRINCE2 Foundation

Projects IN Controlled Environments is a process-oriented project management method and is one of the world's leading project management methods.

Six Sigma Green Belt

The famous Six Sigma principles and methods in the area of process improvement are used to systematically optimise organisational processes

Trust our expertise

Contact us now

Schedule a consultation today

Consultation Contact form