Information Security

Information Security

Cyber­se­cu­ri­ty | Cyber­crime | Prod­uct Devel­op­ment | Coun­selling | Sec­ond Opin­ions | Knowhow Protection

RA Roman Kost
RA | MLaw | cand. BSc ICS

In-house know-how has always been the deci­sive com­pet­i­tive advan­tage. Today, data is also one of the most impor­tant assets of Swiss com­pa­nies. Both must be pro­tect­ed. The high val­ue of these assets is the moti­va­tion for busi­ness espi­onage, hack­er attacks, and the con­stant threat of ran­somware. Knowhow leak­age can pose a seri­ous threat to a company’s suc­cess. Han­dling data with con­fi­den­tial­i­ty and integri­ty and pro­tect­ing know-how must be a top priority.

Infor­ma­tion secu­ri­ty as a com­pet­i­tive advantage

With LAYER 8’s exper­tise, you can suc­cess­ful­ly imple­ment tech­ni­cal, orga­ni­za­tion­al and legal mea­sures, and pro­tect your infor­ma­tion from the threats men­tioned — e.g. indus­tri­al espi­onage, know-how leak­age, hack­er attacks. LAYER 8 ana­lyzes the pro­tec­tion needs with you, sup­ports you in cre­at­ing a secu­ri­ty con­cept, and imple­ments the nec­es­sary mea­sures with you. In this way, you not only meet the require­ments of the leg­is­la­tor, but also strength­en your com­pet­i­tive posi­tion.

And if you put your mind to it: LAYER 8 accom­pa­nies you in tar­get­ed pen­e­tra­tion tests and sub­se­quent­ly advis­es you on putting your secu­ri­ty sys­tem through its paces. Dur­ing pen­tests, we ensure that the secu­ri­ty test takes place with­in a legal frame­work that suits you.
Regard­less of mali­cious attack­ers, the risk of being affect­ed by ran­somware exists due to care­less­ness. LAYER 8 helps you to effi­cient­ly imple­ment the right pro­tec­tive mea­sures.

If it is already too late, LAYER 8 helps you regain con­trol of your com­pa­ny and your data in coop­er­a­tion with select­ed part­ners. We sup­port you in main­tain­ing oper­a­tions and man­ag­ing the cri­sis (cri­sis com­mu­ni­ca­tion). Sub­se­quent­ly, we con­duct the nec­es­sary civ­il or crim­i­nal pro­ceed­ings on your behalf so that you can obtain jus­tice in court.

Spe­cial­ized Legals with rel­e­vant expertise. 

LAYER 8’s attor­neys and lawyers have found­ed train­ing in infor­ma­tion secu­ri­ty, pro­gram­ming lan­guages, data­bas­es, and net­work tech­nol­o­gy through their prac­ti­cal expe­ri­ence, sec­ond degrees, post-grad­u­ate stud­ies, or cer­tifi­cate cours­es. We speak the lan­guage of technicians.

What LAYER 8 does not do: We do not con­fig­ure fire­walls, we do not hack your sys­tems dur­ing a pen­test, we do not orga­nize roll­outs of new hard­ware or patch­es, and we do not write code. 
Thanks to spe­cial­ized train­ing and expe­ri­ence, we know exact­ly when the use of spe­cial­ists is nec­es­sary and whether the sug­ges­tions of exter­nal experts make sense for your use case and your require­ments. LAYER 8 takes care of the legal aspects at the inter­faces to tech­nol­o­gy and organization. 
Infor­ma­tion secu­ri­ty for SMEs and microenterprises 

Microen­ter­pris­es are com­pa­nies with 1 to 10 employ­ees. Excep­tion for those that man­age with­out any IT, all com­pa­nies today rely heav­i­ly on infor­ma­tion tech­nolo­gies. If these tech­nolo­gies fail, entre­pre­neur­ial activ­i­ty is inter­rupt­ed and there is a threat of severe sales loss­es or even bank­rupt­cy. The same applies to SMEs, which rep­re­sent the largest part of the Swiss economy.

LAYER 8 sup­ports you in becom­ing resis­tant to cyber threats (cyber resilience) and in con­tin­u­ing to retain the abil­i­ty to act in the event of damage. 
Prod­uct development 
LAYER‑8 accom­pa­nies you from the begin­ning of the devel­op­ment of your prod­uct. We advise you in nego­ti­a­tion talks with investors, in the con­cep­tu­al design of your prod­uct and ensure that your prod­uct is designed in com­pli­ance with data pro­tec­tion. If you take care of data pro­tec­tion and infor­ma­tion secu­ri­ty at an ear­ly stage, you save your­self time-con­sum­ing and expen­sive retro­fitting of legal com­pli­ance and secu­ri­ty of your product. 

The top­ic of infor­ma­tion secu­ri­ty is also cov­ered by LAYER 8 with:

  • Coach­ing and train­ing in the area of infor­ma­tion secu­ri­ty / infor­ma­tion security
  • Coun­selling in project man­age­ment (project and resource planning)
  • Exter­nal Data Pro­tec­tion Offi­cer (DPO, Data Pri­va­cy Officer)
  • Eval­u­a­tions for C‑Titles (CEO, COO, CIO)
  • Clar­i­fi­ca­tions and risk analy­ses, good / best prac­tice analyses
  • Assign­ment exper­tise in the area of infor­ma­tion secu­ri­ty and data protection
  • Sec­ond Opinions

Con­tact us

Tell us about your needs dur­ing a per­son­al meet­ing or in advance by mail: