THINK SAFE. THINK ICS.
IT / OT - Security
IT/OT security at the highest level. Protect your systems and data with our high-quality security solutions and proven expertise.

Our expertise spans a wide range of industries
We understand the importance of IT/OT security and highly available systems in an increasingly connected world.
That's why we offer tailor-made solutions that minimize risks, ensure compliance and reliably protect systems and data. Whether it's secure development methods, functional safety in the rail sector or the agile development of your security practices, we have the expertise and resources to achieve your goals.

Risk management with SECIRA
Holistic, automated risk management with digital twin, attack tree and context-based measures. For IT, OT and cloud.
NIS2 consulting & training
We support you in understanding your NIS2 obligations, making a well-founded risk assessment and implementing targeted, practicable compliance measures.
Implementing CRA with ICS & SECIRA
Instead of Excel chaos and vague assessments: SECIRA makes risks visible, decisions comprehensible and gets your products safely through the CRA requirements.
Information Security Management System (ISMS)
Protect your company from cyber risks! Our ISMS solutions enable you to meet compliance requirements and secure your data.
Penetration testing
Harden your defenses with targeted penetration tests! We simulate real cyber attacks to uncover security gaps and optimize protective measures in a targeted manner.
CISO as a Service
External security expertise on demand: CISOaaS provides you with strategic cybersecurity leadership without having to fill a full-time position - flexibly, efficiently and tailored to your requirements.
Secure Development
Security right from the start: We embed security throughout the entire development process - for resilient software that reliably withstands current and future threats.
IEC 62443 certification
Your IEC 62443 certification for comprehensive cyber security in the rail sector - together with ICS and SCONRAIL as experienced and reliable partners at your side.
Secure Operations
We strengthen your digital operational security with coordinated protection mechanisms - including PKI to secure identities and data flows.
Security for safety
Protect your systems against digital threats with holistic security management that effectively combines functional safety and cybersecurity.
What is the difference between IT and OT security?
IT security protects traditional information systems such as servers, networks and office IT.
OT security (Operational Technology) concerns industrial systems, control systems (e.g. SCADA, PLCs) and machines. We at ICS - Informatik Consulting Systems GmbH look at both worlds together - because that's what attackers do.
Why is IT security more important today than ever before?
With advancing digitalization and increasingly sophisticated cyber attacks, the importance of IT security is growing rapidly. Companies not only have to protect their systems, but also comply with legal requirements and maintain customer trust. Today, IT security is a decisive factor for stability, competitiveness and future security.
Why OT security is more important than ever today
The increasing networking of industrial plants makes operational technology (OT) an attractive target for cyber attacks. Attacks on control and production systems endanger not only data, but also security, availability and human lives. OT security protects critical infrastructures, secures production processes and is indispensable for the resilience of modern industrial companies.
Which sectors in particular benefit from IT/OT security through ICS?
ICS primarily supports:
-
Operators of critical infrastructures (KRITIS)
-
Railroad and transportation companies
-
Industry & manufacturing (e.g. automotive, mechanical engineering)
Our solutions are tried and tested, audit-proof and customizable for specific industries.
Does ICS support the introduction of an Information Security Management System (ISMS)?
Yes, we support you from the initial risk analysis through to certification in accordance with ISO/IEC 27001.
We focus on practical processes, clear responsibilities and documented measures - ideal for medium-sized organizations with little internal security capacity.
More information about our ISMS
How does the collaboration with ICS work?
You start with a non-binding initial consultation. We analyze your needs together - whether it's a one-off measure or a comprehensive security strategy. You will then receive a clear offer with costs, objectives and implementation steps.
I don't have my own security department. Is that a problem?
No - that is our daily routine. We regularly work with companies that do not have their own security team.
Depending on requirements, we take on analysis, consulting, implementation or even the entire security coordination.









