Landis+Gyr-Strasse 1, 6300 Zug, Switzerland
Telefon: +41 43 508 51 91, E-Mail: info@zentric.ch
Geschäftsführ: Thomas Conrad & Chris Ditze-Stephan
Threat analysis, vulnerability management, and incident response
For over 20 years, Zentric has been providing flexible and straightforward support in threat analysis, vulnerability management, and the assessment and handling of security incidents, including forensic analysis and coordination in the event of security breaches.
Security Incident?
In the event of an IT security incident, you need swift support.
Time is a critical factor, and quick action is essential.
Call us or send an email via Bell.
Industries | Risk Assessment & Management | Training & Awareness | Incident Response Exercises | Incident Response Planning | Digital Forensics | Compliance Support |
---|---|---|---|---|---|---|
Energy Sector | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ |
Financial Sector | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ |
Aviation | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ |
Railway | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ |
Healthcare | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ | ✔️ |
Digital Forensics
We offer comprehensive digital forensics services to investigate and analyze security incidents. Our experts use advanced techniques to secure digital evidence, helping you understand the extent of attacks and protect your systems against future threats.
Examples of our services include
- Data recovery and analysis
- Identification and preservation of digital evidence
- Incident timeline reconstruction
- Malware analysis
- Network forensics
- Expert witness testimony for legal proceedings
- Security breach impact assessment
- Recommendations for improving security posture
Incident Handling and Vulnerability Management
We support you in building robust frameworks for incident handling and vulnerability management. Our approach ensures that your organization can effectively identify, respond to, and mitigate threats to minimize potential damage and downtime.
Cyber Security Risk Management
"Zentric's support was indispensable in our incident management. Their team acted quickly and effectively, providing valuable insights that helped us understand the incident and significantly improve our security measures. Their professionalism and expertise were incredibly helpful during a critical situation."
Incident Response Process
Threat Identification
We help you identify potential threats early by continuously monitoring your systems and their peripherals for vulnerabilities.
Example: Regular checks of your components for vulnerabilities increase the likelihood of discovering and fixing these issues in your software components before attackers can exploit them. Unpatched vulnerabilities are akin to a wide-open handbag with a visible wallet.
Response Strategies
We develop customized response plans (Incident Response Plan) to ensure your organization can respond to security incidents quickly and efficiently.
Example: In the event of a data breach, you will have immediate access to a well-defined plan that includes steps for containment, investigation, and notifying affected parties. There is no time during an event to create or debate such plans.
Risk Mitigation
By implementing proven processes and practices, you can reduce the likelihood of incidents and minimize damage to your components in the event of a security breach.
Example: Introducing two-factor authentication or encryption in the right places can significantly reduce the risk of unauthorized access.
Training and Awareness
We offer training for your staff to enhance their awareness of security threats and equip them with the skills to handle them practically.
Example: Regular training and exercises on handling attacks reduce the likelihood of a successful breach by attackers.
Incident Analysis and Forensics
In the event of a security incident, we assist with forensic coordination and analysis to identify the cause of the incident and prevent future attacks. This includes managing attackers, authorities, and legal counsel.
Example: After a cyberattack, our experts analyze the traces of the attack to understand how the attacker gained access to the system and what measures are necessary to prevent similar incidents in the future.
Standards, Frameworks, and Best Practices
We rely on established standards when planning and implementing new processes. For Incident Response and Vulnerability Handling, the following are particularly relevant:
Incident Handling
ISO/IEC 27035
A comprehensive guide for managing information security incidents, covering planning, preparation, detection, reporting, assessment, decision-making, response, and learning processes.
NIST Special Publication 800-61
A detailed guide from the National Institute of Standards and Technology (NIST) that outlines the process of incident handling in the U.S., including preparation, detection, analysis, containment, eradication, recovery, and post-incident activity.
SANS Incident Handler’s Handbook
Provides practical guidance and best practices for incident handling, covering all phases from preparation to post-incident activity.
FIRST (Forum of Incident Response and Security Teams) Best Practices
Offers global best practices and guidelines for incident response teams, promoting collaboration and information sharing between teams.
Vulnerability Handling
NIST SP 800-216
This publication provides recommendations for establishing a federal vulnerability disclosure framework, emphasizing a structured process for receiving, confirming, analyzing, and addressing vulnerability reports.
ISO/IEC 30111:2019
Guidelines for handling and resolving reported potential vulnerabilities in products or services, aimed at vendors managing vulnerabilities.
ISO/IEC 29147:2018
Focuses on vulnerability disclosure, ensuring effective and secure communication of vulnerabilities between involved parties.
OWASP Vulnerability Management Guide (VMG)
A comprehensive guide to setting up an effective vulnerability management program, covering the entire lifecycle from preparation to remediation.
OWASP Vulnerability Management Center (VMC)
Provides extensive resources for managing vulnerabilities systematically and efficiently, including detection, prioritization, remediation, and reporting.
Cyber Security Risk Management
All security efforts stem from our concern about threats to our integrity. Insecurity implies vulnerability. How severe is this threat? How likely is it? Can we recognize it as it emerges? Are we capable of accurately assessing the potential damage, and what can we do to mitigate the threat and resulting risks? Ensuring security always involves identifying, evaluating, and somehow managing risks.
Standards, Frameworks, and Best Practices
ISO/IEC 27005
This standard provides guidelines for information security risk management and is an integral part of the ISO/IEC 27001 standard for Information Security Management Systems (ISMS). It supports organizations in conducting risk assessments within the context of their information security objectives.
NIST Risk Management Framework (RMF)
The NIST RMF integrates security and privacy risk management into the system development lifecycle. It encompasses steps such as preparation, categorization, selection, implementation, assessment, authorization, and continuous monitoring.
Why Is It Important?
In today’s digital economy, security vulnerabilities can have significant financial and operational impacts. A thorough Cybersecurity
Due Diligence Assessment helps companies:
- Identify and mitigate risks: Detect security gaps early that could threaten business continuity and reputation.
- Preserve and enhance value: Ensure the target company or product meets security standards to protect potential investments.
- Ensure regulatory compliance: Confirm adherence to relevant legal and regulatory requirements to avoid legal and financial consequences.
Incident Response Exercises
In today’s digital world, cyberattacks are a constant threat to organizations of all sizes and industries. To ensure your team is optimally prepared for such attacks, we offer tailored Cybersecurity Incident Response Exercises. These exercises are specifically designed to meet the needs of your organization and simulate real-world attack scenarios. We help your team practice and refine response strategies to enhance overall readiness and resilience.
What We Offer
Planning and Coordination
Our experts design and coordinate comprehensive Incident Response Exercises tailored to your specific requirements and risks. We take into account your existing security policies, infrastructure, and potential threats.
Realistic Scenarios:
We simulate a wide range of realistic attack scenarios covering various types of cyber threats, including phishing attacks, ransomware, insider threats, and Advanced Persistent Threats (APTs).
Comprehensive Injects and Techniques:
Our exercises include a broad range of injects and techniques to test different aspects of your incident response capabilities. These encompass technical challenges, communication demands, and organizational response processes.
Evaluation and Feedback:
Following each exercise, we provide a comprehensive evaluation and detailed feedback. This includes assessing detection and response speed, the effectiveness of measures, and communication within the team.
Evaluation Criteria
To measure the effectiveness and efficiency of your incident response capabilities, we use a structured methodology based on the following criteria:
- Detection and Identification: Speed and accuracy in identifying and detecting incidents.
- Analysis and Assessment: Thoroughness and accuracy of incident analysis and documentation.
- Response and Containment: Speed and effectiveness of response and containment measures, as well as internal and external coordination.
- Remediation and Recovery: Completeness of remediation, speed of recovery, and verification of actions.
- Communication: Effectiveness of internal and external communication, and transparency with stakeholders.
- Lessons and Improvements: Insights gained from incidents and implementation of improvements to strengthen security.
- Adherence to Policies and Protocols: Compliance with internal and external security policies and regulatory requirements.
- Technical Aspects: Use of appropriate tools and technologies, and application of technical expertise.
Your Benefits
Through our tailored Incident Response Exercises, your organization’s ability to respond to and recover from cyber threats will significantly improve. Your team will be equipped to react faster and more effectively to attacks, mitigate damage, and ensure business continuity.
Contact us today to learn more about how our Incident Response Exercises can strengthen your security posture.
Cybersecurity Incident Response Exercise with a Railway Control Technology Supplier
RailTech Systems, a leading supplier of control technology for the railway sector specializing in ETCS Level 1 to 3 systems, recently conducted a comprehensive Cybersecurity Incident Response Exercise. The goal was to test the company’s response capabilities in the event of a cyberattack and identify vulnerabilities in its IT security architecture.
During the simulation, a targeted attack on the control systems was staged to evaluate the defensive measures of the internal IT department and its partners. The attack targeted critical systems essential for real-time communication and the safe operation of trains.
The exercise revealed that while the security measures for detecting intrusion attempts were effective, some response processes, particularly in communication between internal and external teams, required optimization. Specifically, protocols for swift recovery after a cyber incident were revised to significantly reduce response times.
As a result of this exercise, RailTech Systems significantly improved its ability to detect and respond to cyberattacks. The findings led to immediate adjustments to emergency plans and enhanced threat mitigation measures to ensure the security and operation of their ETCS systems.
Introduction of Cybersecurity Standards in Key Industries
We specialize in the implementation of cybersecurity standards across various industries, ensuring your organization adheres to the highest security standards and complies with industry regulations:
Semiconductors
ISO/IEC 27001: An internationally recognized standard for Information Security Management Systems (ISMS), providing a systematic approach to protecting sensitive information.
IEC 62443: A globally acknowledged standard focusing on the cybersecurity of Industrial Automation and Control Systems (IACS), offering best practices for safeguarding critical infrastructure and industrial facilities.
ISO/IEC 15408 (Common Criteria): An international standard for evaluating the security features of IT products. It provides a framework for assessing and certifying IT systems and products to ensure they meet specific security requirements.
Automotive
ISO/SAE 21434: An international standard defining cybersecurity management requirements for the automotive industry, offering guidelines for the entire vehicle lifecycle.
ISO 26262: A standard focused on the functional safety of road vehicles, addressing electronic and electrical systems.
TISAX (Trusted Information Security Assessment Exchange): A standardized approach to information security assessments tailored for the automotive industry.
Healthcare
HIPAA (Health Insurance Portability and Accountability Act): U.S. legislation providing data privacy and security provisions for safeguarding medical information.
ISO/IEC 27799: A standard offering guidelines for information security management in healthcare organizations.
IEC 62304: A standard focusing on the lifecycle requirements for medical device software.
Civil Aviation
DO-326A/ED-202A, DO-356A/ED-203A, DO-355A/ED-204A: Standards addressing cybersecurity in aviation, including airworthiness and operational considerations.
ISO/IEC 27001: Applied in aviation to protect sensitive data and ensure robust information security practices.
Railway
TS 50701: A cybersecurity standard tailored for the railway sector, addressing threats in connected systems.
IEC 62443: Extending its application to railway automation and control systems for enhanced security.
ISO/IEC 27001: Ensuring secure information management in the railway industry.
By leveraging these standards, we enable organizations to enhance their cybersecurity posture, meet regulatory demands, and protect critical assets effectively.
Due Diligence
Cybersecurity Due Diligence: What is a Cybersecurity Due Diligence Assessment and How Does It Work?
In today’s digital world, cybersecurity is increasingly central to the success and survival of businesses. Especially during acquisitions or investments in other companies, a key question often arises: How secure is the IT infrastructure and data of the target company? A Cybersecurity Due Diligence Assessment is the process that answers these questions.
How a Cybersecurity Due Diligence Assessment Saved an Acquisition
TechSphere Solutions planned to acquire the startup DataStream Innovations, which had developed an innovative cloud platform. To ensure there were no hidden cybersecurity risks, TechSphere conducted a Cybersecurity Due Diligence Assessment.
The assessment revealed several critical vulnerabilities in IT security, including exposed interfaces and insufficient security zoning. Penetration tests also uncovered security gaps that DataStream had not yet addressed.
Instead of abandoning the acquisition, TechSphere supported DataStream in addressing these vulnerabilities. Together, they implemented security measures and significantly improved the platform.
Thanks to the assessment, the acquisition was successfully completed, and TechSphere benefited from a secure, high-performance cloud solution.
A Cybersecurity Due Diligence Assessment is a comprehensive evaluation process designed to assess the cybersecurity posture of a company or specific product prior to an acquisition or investment. The goal is to identify potential risks, vulnerabilities, and threats that could impact the value, security, and future of the acquisition or investment.
While financial and legal due diligence are often emphasized during acquisitions, neglecting cybersecurity risks can have disastrous consequences. Companies that overlook these risks may face significant challenges post-acquisition, such as data breaches, hacks, unexpected fines, or even reputational damage.
A Cybersecurity Due Diligence Assessment is a critical part of any M&A process. It protects companies from potential financial and security disasters by identifying risks and recommending measures to mitigate them. The process ensures businesses can rely on a secure acquisition or investment without worrying about unexpected security issues later.
Do you want to ensure your acquisition or investment is built on a stable, secure foundation?
Contact us for a comprehensive Cybersecurity Due Diligence Assessment and safeguard yourself against hidden risks.
Cyber Security Risk Management
All security efforts stem from our concern for the threat to our integrity. Uncertainty means vulnerability. How severe is this threat? How likely is it? Can we recognize it when it emerges? Are we able to accurately assess the potential damage, and what actions can we take to address the threat and the resulting risks? Ensuring security always means identifying, evaluating, and somehow managing risks.
Standards, Frameworks, and Best Practices
ISO/IEC 27005:
This standard provides guidelines for information security risk management and is an integral part of the ISO/IEC 27001 standard for Information Security Management Systems (ISMS). It supports organizations in conducting risk assessments in the context of their information security objectives. Further details can be found here.
NIST Risk Management Framework (RMF)
The RMF standard by NIST integrates security and privacy risk management into the system development lifecycle. It includes the steps of preparation, categorization, selection, implementation, assessment, authorization, and continuous monitoring. Learn more here.
In today’s digital economy, security gaps can have significant financial and operational impacts. A thorough Cybersecurity Due Diligence Assessment helps organizations:
A leading technology company planned the acquisition of a startup that developed innovative IoT products. A thorough Cybersecurity Due Diligence Assessment identified significant security vulnerabilities in the startup’s IoT platform. These findings led to targeted security improvements before the integration, significantly reducing the risk of cyberattacks and ensuring the long-term success of the acquisition.
Are you interested in a Cybersecurity Due Diligence Assessment to secure your next corporate or product acquisition? Contact us today for a consultation and ensure your investments are protected.
We work across industries and national borders. In the event of security-relevant incidents, we are available to assist you promptly.
If you are interested, please use our contact details and include the respective title as a keyword in the subject line. We would also be happy to send you shortened sample editions.
In the modern aviation industry, cybersecurity is of growing importance. As aircraft, manufacturing processes, and operations become increasingly interconnected and reliant on digital systems, the potential for cyber threats has significantly risen. Zentric is dedicated to providing comprehensive cybersecurity concepts and solutions tailored to civil aviation, ensuring the highest levels of flight safety and protection.
Civil aviation faces entirely new cybersecurity challenges due to its reliance on interconnected systems and the critical nature of its operations. Threats can originate from various sources, including state-sponsored actors, criminal organizations, and even insider threats. The consequences of a successful cyberattack in this sector can be catastrophic, endangering passenger safety, and compromising national security and economic stability.
Adhering to international standards and regulations is a cornerstone of effective cybersecurity in civil aviation. Key standards include:
We conduct all necessary cybersecurity risk assessments to identify vulnerabilities in your systems. We develop strategies to mitigate these risks.
We offer specialized training programs for aviation personnel to enhance their understanding of cybersecurity threats and best practices. Our awareness campaigns are designed to foster a security-focused culture within your organization.
To ensure readiness, Zentric conducts incident response exercises tailored to the unique needs of the civil aviation sector. These exercises simulate real-world attack scenarios, helping your team practice and refine their response strategies.
Our experts assist you in preparing for potential cyber incidents by developing robust response plans. These plans ensure a swift and effective response, minimizing the impact of security breaches.
In the event of a cyber incident, our digital forensics team is prepared to investigate and analyze the incident to understand the attack and prevent future occurrences.
Navigating the complex web of cybersecurity regulations in aviation can be challenging. Zentric provides expert guidance to ensure your organization meets all relevant standards and complies with regulatory requirements.
In the rapidly evolving field of civil aviation, maintaining robust cybersecurity measures is essential to ensuring both safety and operational integrity. Zentric's comprehensive cybersecurity solutions provide the necessary protection against emerging threats, keeping the skies safe for everyone. This includes flight schools, accessory suppliers, and all stakeholders in the aviation industry.
For more information on how Zentric can support your cybersecurity needs in civil aviation, contact us today.
In the financial industry, cybersecurity is of paramount importance. With the increasing digitization and interconnection of financial systems, the potential for cyber threats is growing exponentially. Zentric is committed to providing comprehensive cybersecurity solutions tailored to the unique needs of the financial sector, ensuring the safety and protection of financial operations at the highest level.
The financial sector faces unique cybersecurity challenges due to the complexity and interconnectedness of its systems. This includes emerging threats from technologies like real-time payment systems and decentralized financial platforms. Threats can originate from state-sponsored actors, criminal organizations, or internal sources. The consequences of a successful cyberattack in this sector can be devastating: customer trust is eroded, operations are disrupted, and regulatory compliance is jeopardized.
Core banking systems, payment gateways, and digital wallets are essential components of modern financial operations. Their security is critical to prevent unauthorized access, fraud, and potential disruptions. Branches and data centers rely on interconnected systems, including customer databases, communication networks, and power supplies, all of which require robust protection to ensure smooth operations and safeguard sensitive data.
Additionally, regional standards such as MAS Technology Risk Management Guidelines, FCA Handbook, and OSFI Guidelines further ensure that financial institutions comply with stringent cybersecurity and IT control requirements.
In the rapidly evolving financial sector, maintaining robust cybersecurity measures is essential to ensure customer trust and operational integrity. Zentric's comprehensive cybersecurity solutions provide the necessary protection against emerging threats and help keep financial systems secure.
Contact us today to learn more about how Zentric can support your cybersecurity needs in the financial sector.
Paragraph
Patient Safety Through Cybersecurity
In the modern healthcare industry, cybersecurity is of paramount importance. With medical devices and systems increasingly interconnected and reliant on digital technologies, the potential for cyber threats has grown exponentially. Zentric is dedicated to providing comprehensive cybersecurity solutions tailored specifically to the healthcare sector, ensuring both patient safety and the protection of sensitive health data.
The Importance of Cybersecurity in Healthcare
Healthcare faces unique cybersecurity challenges due to its reliance on interconnected systems and the sensitive nature of the data it processes. Threats can originate from various sources, including state-sponsored actors, criminal organizations, and even insider threats. The consequences of a successful cyberattack in this sector can be catastrophic, jeopardizing patient safety and compromising the integrity of health data.
Key Focus Areas
Security of Medical Devices and Diagnostic Equipment
Modern medical devices and diagnostic systems are equipped with advanced digital technologies, making them vulnerable to cyberattacks. Ensuring the security of these systems is crucial to prevent unauthorized access and potential sabotage.
Hospital Infrastructure
Hospitals are complex environments with numerous interconnected systems, including electronic health records, imaging systems, and administrative software. Securing these systems is essential to ensure smooth hospital operations and the protection of sensitive patient data.
Pharmaceutical Manufacturers
Pharmaceutical companies are prime targets for cyberattacks due to the high value of their intellectual property and clinical data. Protecting these assets is critical to safeguarding research and development processes.
We conduct all necessary cybersecurity risk assessments to identify vulnerabilities in your systems. We develop strategies to mitigate these risks effectively.
We offer specialized training programs for healthcare personnel to enhance their understanding of cybersecurity threats and best practices. Our awareness campaigns are designed to foster a security culture within your organization.
To ensure readiness, Zentric conducts incident response exercises tailored to the unique needs of the healthcare sector. These exercises simulate real-world attack scenarios, helping your team practice and refine their response strategies. This proactive approach enhances overall preparedness and resilience against potential cyber threats.
Our experts assist you in preparing for potential cyber incidents by developing robust response plans. These plans ensure a swift and effective response, minimizing the impact of security breaches.
In the event of a cyber incident, our digital forensics team is ready to investigate and analyze the incident to understand the attack and prevent future occurrences.
Navigating the complex web of cybersecurity regulations in healthcare can be challenging. Zentric provides expert guidance to ensure your organization meets all relevant standards and complies with regulatory requirements.
We support pharmaceutical manufacturers and diagnostic equipment producers in conducting security assessments both before and after market launch to ensure product safety and compliance.
Zentric assists in creating and implementing security concepts, policies, standards, and procedures to ensure your organization is comprehensively protected.
We help your teams implement DevSecOps practices, integrating security into every phase of the development and operations lifecycle, ensuring continuous security.
In the rapidly evolving healthcare sector, maintaining robust cybersecurity measures is essential to ensure both patient safety and the integrity of operational processes. Zentric's comprehensive cybersecurity solutions provide the necessary protection against emerging threats, ensuring the safety of all areas within the healthcare industry.
For more information on how Zentric can support your cybersecurity needs in healthcare, contact us today.
Ensuring Safety on the Rails
In the modern railway industry, cybersecurity is of critical importance. With the increasing digitization and interconnection of railway systems, the potential for cyber threats has grown exponentially. Zentric is dedicated to providing comprehensive cybersecurity solutions tailored to the specific needs of the railway sector, ensuring the highest level of safety and protection for railway systems.
The Importance of Cybersecurity in the Railway Sector
The railway sector faces unique cybersecurity challenges due to the complexity and interconnectivity of its systems. Threats can originate from various sources, including state-sponsored actors, criminal organizations, and insider threats. The consequences of a successful cyberattack in this sector could be catastrophic, jeopardizing passenger safety and compromising the operational integrity of railway systems.
Key Focus Areas
ETCS and Signaling Systems Security
The European Train Control System (ETCS), balises, and Radio Block Centers (RBCs) are critical components of modern railway systems. Ensuring their security is vital to prevent unauthorized access and potential sabotage.
Station and Track Infrastructure
Stations and track infrastructure include numerous interconnected systems, such as signaling systems, communication networks, and power supplies. Securing these systems is essential to ensure smooth railway operations and protect sensitive data.
Suppliers and Technology Providers
Suppliers of railway components and technologies are integral to the railway ecosystem. Their cybersecurity is critical to preventing supply chain attacks that could compromise the safety and performance of railway systems.
We conduct all necessary cybersecurity risk assessments to identify vulnerabilities in your systems. We develop strategies to effectively mitigate these risks.
We offer specialized training programs for railway employees to enhance their understanding of cybersecurity threats and best practices. Our awareness campaigns are designed to foster a security-focused culture within your organization.
To ensure readiness, Zentric conducts incident response exercises tailored to the unique needs of the railway sector. These exercises simulate real-world attack scenarios, helping your team practice and refine their response strategies. This proactive approach enhances overall preparedness and resilience against potential cyber threats.
Our experts assist you in preparing for potential cyber incidents by developing robust response plans. These plans ensure swift and effective reactions, minimizing the impact of security breaches.
In the event of a cyber incident, our digital forensics team is prepared to investigate and analyze the event to understand the attack and prevent future occurrences.
Navigating the complex web of cybersecurity regulations in the railway sector can be challenging. Zentric provides expert guidance to ensure your company meets all relevant standards and complies with regulatory requirements.
Conclusion
In the rapidly evolving railway sector, maintaining robust cybersecurity measures is essential to ensure both passenger safety and operational integrity. Zentric's comprehensive cybersecurity solutions provide the necessary protection against emerging threats, ensuring railway systems remain secure.
For more information on how Zentric can support your cybersecurity needs in the railway sector, contact us today.
In the energy sector, cybersecurity is of critical importance. With the increasing digitization and interconnection of energy systems, the potential for cyber threats has grown exponentially. Zentric is committed to delivering comprehensive cybersecurity solutions tailored to the unique requirements of the energy sector, ensuring the safety and protection of energy infrastructures at the highest level.
The energy sector faces unique cybersecurity challenges due to the complexity and interconnectivity of its systems. Innovations like smart grids, decentralized energy generation, and IoT-based controls introduce new threats. These threats can originate from state-sponsored actors, criminal organizations, or internal sources. The consequences of a successful cyberattack can be catastrophic, leading to power outages, production disruptions, and threats to supply security.
In the evolving energy sector, maintaining robust cybersecurity measures is essential to ensure supply security and operational resilience. Zentric's comprehensive cybersecurity solutions provide the necessary protection against emerging threats, ensuring energy infrastructures remain secure and reliable.
Contact us today to learn how Zentric can support your cybersecurity needs in the energy sector.
We conduct comprehensive cybersecurity risk assessments to identify vulnerabilities in your systems. We help you develop mitigation strategies and support the creation of SBOMs (Software Bill of Materials) in line with regulatory and country-specific requirements.
We provide specialized training programs for energy providers, engineers, managers, and service teams to enhance their understanding of cybersecurity threats and best practices. Our awareness campaigns foster a strong security culture within your organization.
To ensure readiness, Zentric plans, organizes, and conducts incident response exercises tailored to the specific needs of your energy infrastructure. These exercises simulate realistic attack scenarios to help your team practice and optimize response strategies.
Our experts assist you in preparing for potential cybersecurity incidents by collaboratively developing robust incident response plans. These plans ensure a swift and effective response and minimize the impact of security incidents.
In the event of a cybersecurity incident, our digital forensics team is ready to investigate and analyze the incident. This helps to understand attacks and ideally prevent future occurrences.
Navigating the complex framework of cybersecurity regulations in the energy sector can be challenging. Zentric provides expert guidance to ensure your organization meets all relevant standards and regulatory requirements.
We offer training on essential topics in cyber and information security. Attend our seminars or inquire about possible in-house training sessions.
Short Presentations
Currently in-demand training courses
Further Training Opportunities
If you wish to send an email with higher confidentiality, please feel free to use our public PGP key.
Landis+Gyr-Strasse 1, 6300 Zug, Switzerland
Telefon: +41 43 508 51 91, E-Mail: info@zentric.ch
Geschäftsführ: Thomas Conrad & Chris Ditze-Stephan
Preface
If you do not wish for your current IP address to be stored here or by other software library providers associated with us, please leave this page or refrain from using internet browsers, email clients, or other internet tools. Upon entering a web address (DNS name), and even before accessing our or any other website, your IP address will be shared with DNS servers, routers, and potentially search engines, where it may be stored and managed temporarily.
1. Name and Contact Details of the Data Protection Officer
The role of a Data Protection Officer is not mandatory at Zentric. The contact person is Mr. Chris Ditze-Stephan.
2. Collection and Storage of Personal Data and Their Usage
a) Visiting the Website
When accessing our website, www.zentric.*, information is automatically sent by the browser used on your device to our website's server. This information is temporarily stored in a log file and includes:
IP address of the requesting computer
Date and time of access
The website from which the access occurred
Name and URL of the accessed page
Browser used and, where applicable, the operating system of your computer and the DNS name of your internet provider
These data are processed for the following purposes:
Required for the operation of the HTTPS protocol
Analysis for system security and stability when necessary
Administrative purposes, such as blocking attacker IP addresses during incidents
The legal basis for processing this data is Article 6(1) of the GDPR. Our legitimate interest arises from the purposes listed above. Under no circumstances do we use the logged data to draw conclusions about you personally.
b) Contact Form Use
When using our contact form, providing your name and email address is required for us to respond. Additional details are optional. The data processing for contacting us is based on Article 6(1) of the GDPR and your voluntary consent. Data collected via the contact form is automatically or manually deleted after your inquiry has been addressed.
You may also contact us via email or phone.
3. Data Sharing
Personal data collected through the contact form will not be shared with third parties, except for purposes explicitly outlined here.
4. Cookies
Cookies may be indirectly used via libraries integrated into our website.
Cookies store information related to the device in use. Most browsers accept cookies automatically. However, you can configure your browser to prevent cookies from being stored or to alert you before a new cookie is created. Disabling cookies entirely may result in limited website functionality.
7. Rights of the Data Subject
You have the following rights:
Right to Access: Request information about your processed personal data (Article 15 GDPR).
Right to Rectification: Request the correction of inaccurate or incomplete data (Article 16 GDPR).
Right to Erasure: Request deletion of your personal data, provided there is no legal or legitimate requirement for retention (Article 17 GDPR).
Right to Restriction: Request the limitation of data processing under certain conditions (Article 18 GDPR).
Right to Data Portability: Request your data in a structured, commonly used, and machine-readable format (Article 20 GDPR).
Right to Withdraw Consent: Withdraw consent at any time without affecting the lawfulness of processing based on consent before its withdrawal (Article 7(3) GDPR).
Right to Lodge a Complaint: File a complaint with a supervisory authority (Article 77 GDPR).
For exercising these rights, email us at: datenschutzbeauftragter@zentric.de
8. Right to Object
Under Article 21 GDPR, you may object to data processing based on legitimate interests, provided there are reasons relating to your particular situation. Objections to direct marketing are unrestricted.
9. Data Security
We use TLS encryption with the highest level supported by your browser, generally 256-bit encryption. For unsupported browsers, 128-bit v3 technology is used. This encryption will be further strengthened as technology evolves.
10. Cloudflare
We use Cloudflare's CDN for performance and security. Your data, including your IP address, may be processed worldwide. For details, refer to Cloudflare's privacy policy.
11. Twitter Integration
Our website integrates Twitter functionalities, governed by Twitter's Privacy Policy.
12. Google CDN
We use Google’s CDN for jQuery to enhance website loading speeds. Data shared during such requests may be transferred to the USA under Google’s policies.
13. Updates
This policy is effective as of May 2018 and may be updated to reflect changes in laws or services.
Insecurity means: "The worst possible damage that can occur if your worst enemy had control of [your]computer."
Thinking Security, S.M. Bellovin