Accessibility Tools

  • Content scaling 100%
  • Font size 100%
  • Line height 100%
  • Letter spacing 100%
msg consulting security advisors risk management cyber security

msg advisors combines IT security expertise in new expert unit “msg security advisors”

msg advisors combines IT security expertise in new expert unit “msg security advisors”

Back to Newsroom

msg advisors is combining its expertise in the IT security environment in the expert unit "msg security advisors" with immediate effect.

More than 100 experts work for this expert unit throughout Germany. The service portfolio of the new area for professional information security includes specific cyber consulting offerings for banks, insurance companies, automotive, pharmaceuticals, healthcare and public administration. Jens Westphal and Thomas Soens are responsible for managing the business area.

Successful standard processes as basis for qualified company IT

Companies can have their risk management and security concepts created, checked and optimized by msg security advisors. In addition, the unit also develops strategies to avert threats and helps implement identity and access management (IAM) strategies and solution architectures. Because: Qualified and validated company IT is based on successful standard processes. To achieve this, organizational goals, processes, employees, methods and technologies must be coordinated as an effective system that includes cyber security. In addition, the demands on digital processes are increasing rapidly. Against this backdrop, msg security advisors is increasingly focusing on using AI, as this holds enormous potential for averting cyberattacks in the area of IT security. Cloud computing has emerged as another important field of action for information security in recent years. Here, the way in which IT services are provided and used is changing significantly. This necessitates an equally fundamentally different assessment of information security, whereby all phases of the path to the cloud need to be considered: From strategy to architecture, migration, operation to the completion of cloud usage a reconsideration of threat and risk scenarios is necessary, resulting in specific measures to ensure the security value of the information processed and processes implemented.

“We approach cyber security holistically and support organizations at all levels: In cyber security and data protection, we set new standards with our know-how – whether in strategy, design or in operational and methodological implementation. Our expertise also focuses on IT risks and compliance management”, says Thomas Soens.

His colleague Jens Westphal adds: “We see the increasing challenges in strategic cybersecurity as an opportunity. In tandem with our customers, we increase the potential for successful digitalization and create more resilience for their organization against threats from cyberspace.”