Cyber Security für Informationstechnik IT

Information Technology (IT) Cybersecurity

Our services for more Cyber Security of information technology 

We increasingly depend on information technology to manage our key business processes at work, as well as in our private lives. Any new service invariably becomes connected through IT systems, networks, software and the internet. This in turn makes them more vulnerable to hostile or accidental security breaches. At Bureau Veritas, we independently confirm that you (and your suppliers) meet cybersecurity regulations and standardized criteria to mitigate that risk.


We cannot live without information & communication technology (ICT) anymore. But the constant threat of hackers taking advantage of vulnerable services emphasizes how crucial security, protection and privacy are to us all, and to our business activities.

Due to its critical societal aspects, cybersecurity has also become a compliance topic. In Europe, for instance, privacy is regulated through the General Data Protection Regulation (GDPR). Operators of Essential Services (OESs) and Digital Service Providers (DSPs) must comply with the EU Network and Information Security (NIS) directive.

How can you be sure that your organization and systems are secure and compliant? To answer this question, there are many standards, best practices and guidelines such as ISO 27001, ISO 27017 for Cloud Security, OWASP Guidelines, NIST Guidelines.

As a global leader, Bureau Veritas provides needed independent cybersecurity services to assess and certify your IT systems.

Our Services for people, process and technology

Ausbildung, Praktika & Werkstudententätigkeit


Security Awareness and Behavior (SAFE)

Phishing tests

Social Engineering

Training Courses (e.g. Cloud Security, Mobile App Security, Hands-on Hacking)


Kundenspezifische Audits


Security Management Implementation
(ISO 27017, ISO 27018, ISO 27031, ISO 27001 ISMS)

IT Service Management Systems - ISO 20000-1 ITSMS, TickIT

TISAX®, eIDAS Certification

Security Maturity Review

IT Risk Assessment (Site)

Vendor Security

Privacy / Data protection / ISO 27701 PIMS / BVC TS for GDPR

ISAE 3000 / 3402 Assurance

Forensics Readiness



Threat Modeling / Design Review / Code Review

Vulnerability Assessment & Penetration Testing

Cloud Security

Red Teaming

Secure Software Development Lifecycle (S-SDLC)

SIEM/SOC Testing



Discover our Information Security Management System (ISMS) Certifications for a holistic protection of your company data.

You were not able to find the right service?

Find more services in the Solution Finder or send us your message