Holistic cybersecurity. Practical, legally compliant and tailored to your business risks
Cybersecurity has long since become a corporate obligation: threats such as ransomware, social engineering and targeted attacks on critical infrastructure require a strategically thought-out and tailor-made IT security architecture.
As an experienced partner, Swiss Infosec AG supports you in analysing, improving and sustainably anchoring your IT security in line with current cybersecurity best practices: holistic, practical and legally compliant.
A dedicated team of cyber and IT security specialists and penetration testers supports you with a broad portfolio of consulting services and training courses on cyber and IT security. Whether technical protective measures, organisational guidelines or security by design: our cybersecurity consulting is aimed at IT managers, CISOs and internal departments who do not want to leave security to chance.

NIST graphic: The NIST Cybersecurity Framework structures cybersecurity into five core functions: Identify, Protect, Detect, Respond, and Recover. The graphic illustrates how these functions interact to systematically manage cyber risks and strengthen organizational resilience.


Penetration Test
Take advantage of the expertise of Swiss Infosec AG’s penetration testers to carry out an attack simulation to test the resilience of your systems. Swiss Infosec AG’s penetration testers use the same tools, techniques and procedures (TTP) that would be used in a real attack. Get more information about:


Cyber and IT emergency management
Cyberattacks, system failures or data loss can occur at any time. The decisive factor is how well your organisation is prepared for them. We support you in setting up effective cyber and IT emergency management: from clearly defined processes and roles to practical emergency plans and realistic exercises.
- IT emergency management and IT emergency exercises (IT-specific)
- Crisis management and crisis team exercises (organisation-wide)
- Cyber incident workshop: preparation and incident response
- Incident response


Software Security
Do you want to check and sustainably improve the security level of your software products? Whether high-level analysis of software design and architecture or low-level analysis of source code: we offer individual software security reviews tailored to your requirements.


Darknet Exposure Reporting
Early identification of leaks and breaches in the darknet, deep web and relevant criminal forums provides an understanding of your company’s exposure in relevant areas of the internet and can also be used as an early warning system for attempted attacks. Our service enables you to identify risks such as identity theft, reputational damage or targeted attacks in good time and to take proactive countermeasures.


Legislation and regulatory requirements
The threat posed by cybercrime and cyber warfare is increasingly being addressed by legislators and supervisory authorities with appropriate legal and regulatory requirements. With our combination of legal, technical and organisational expertise, we support you in addressing the applicable requirements in a practical and appropriate manner.
- FINMA circular 2023/1: Operational risks and resilience
- Information security law of the Federation (ISL)
- Digital Operational Resilience Act (DORA)
- EU directive Network and Information Security (NIS2)
- Cyber security and data protection laws of the People’s Republic of China


Cloud Services Security & Compliance
Although the use of cloud services can offer many advantages, it also regularly causes headaches for those responsible for security and compliance. The additional complexity in terms of technical architecture, legal requirements and organisational challenges is anything but trivial to deal with. We would be happy to support you with the challenges ahead.
- Hardening checks & cloud security posture management
- IT provider assessments
- Microsoft Cloud Security & Compliance


IT security processes and concepts
IT security audits are only snapshots and do not guarantee sustainable IT security for your organisation. We would be happy to support you at the conceptual level in establishing suitable and pragmatic IT security processes or in developing specific IT security concepts. Get more information about:


Training and awareness
Around half of all cyber attacks succeed due to human error. We are happy to support you with various methods to raise your employees’ awareness of IT security issues. Get more information about:
