Managing cyber risks at the board level

IT/OT Risk Analysis at the Board of Directors Level

Initial assessment in accordance with ISO 27005

Semi-annual reassessment

VR-compatible reports in business language

Compliance: OR 716a, nDSG, FINMA

Cyber risks are a top priority—we make them tangible.

Under Article 716a of the Swiss Code of Obligations, the board of directors bears personal and non-transferable responsibility for risk management. This includes cyber risks. But how do you assess risks that change daily and are technically complex?

Structured risk analysis instead of gut feelings

SecureComply provides you with an independent IT/OT risk assessment in accordance with ISO 27005—translated into clear, actionable reports written in plain language. No technical jargon, no 80-page reports—just precise assessments that enable you, as a member of the board of directors, to make informed decisions and demonstrably fulfill your duty of care.

Consistent. Structured. Audit-proof.

From the initial assessment to defining measures and responsibilities, right through to the semi-annual reassessment—you get everything from a single source. This allows you to maintain a clear overview of your cyber risks: continuously updated and always ready for inspections, audits, or regulatory inquiries.

Compliance that protects you

Our reports and processes are aligned with the requirements of OR 716a, the nDSG, and FINMA guidelines. You will not only gain transparency into your risk profile, but also receive documented evidence that your board of directors is fulfilling its supervisory duties in the area of IT/OT security.

Our Other Services & Solutions

IT, Product, and OT Security from a Single Source

Product, IT, and OT Security - Comprehensive Security Consulting

  • Security Assessments & Gap Analyses
  • Strategy Development & Security Roadmaps
  • IT/OT Convergence & Industrial Security (IEC 62443)
  • vCISO Engagements & Project Support
Learn more

Passwordless Federated SSO & PKI Automation – Soliton

Zero-Trust Identity

  • Passwordless Authentication
  • Federated SSO (SAML / OIDC)
  • Automated Certificate Lifecycle Management
  • Zero-Trust Architecture & Integration
Learn more

Identify attack vectors before attackers exploit them – XM Cyber

Continuous Exposure Management

  • Continuous attack simulation
  • Attack Path Management
  • Prioritized recommendations for action
  • Integration with existing security tools
Learn more

Stefan Hungerbühler

CEO of SecureComply GmbH

Expertise on an equal footing
Do you have any questions?

In today’s ever-changing threat landscape, taking a proactive approach is crucial. We’ll show you how to use Continuous Exposure Management and Attack Path Management to close security gaps before they can be exploited, and how to seamlessly integrate these solutions into your existing infrastructure.

Stefan Hungerbühler

CEO of SecureComply GmbH

SecureComply GmbH

‍Islerenweg 5a
8708 Männedorf

info@securecomply.ch
+41 79 746 35 88

© SecureComply, LLC