Information security law attorney

Information security law

Systematic safety: obligations, measures and evidence.

We structure information security in a legally compliant manner, covering everything from governance and ISMS to contracts, supply chains and incident response. All of these areas are tested against NIS2, ISO 27001 and BSI requirements.

Arrange an initial consultation

Challenges

Common pitfalls in information security

  1. Regulatory framework (BSIG, NIS2, DORA, CRA, KRITIS)
    Which requirements apply to your company? From when? With what evidence? What are the supervisory requirements?
  2. Roles, responsibilities & governance
    Clearly define and implement the organisation, responsibilities, policies and controls of information security.
  3. Supply chain & Contracts
    Include security obligations, audit rights, minimum standards and reporting channels in service provider, cloud & outsourcing contracts.
  4. Incident management & Reporting obligations
    Incidents must be detected, handled, and reported in a timely manner, including forensics, communication, and lessons learned.
  5. Technical and organisational measures & evidence
    Keep technical and organisational measures (TOM), training, tests (e.g. ransomware readiness) and documentation consistent and verifiable.

Relevance

Who we help and why

For CISOs, in-house lawyers, medium-sized businesses and KRITIS companies: We simplify information security law, providing clear obligations, robust contracts and resilient processes.

CISO

We define governance, roles and reporting, embedding evidence in your processes.

CISO

We need to implement NIS2/DORA because we lack clear responsibilities and reliable evidence.

In-house lawyers

We incorporate security, audit and incident management rules into the contracts of your suppliers and partners.

In-house lawyers

We need contract clauses on security, auditing and reporting that are effective in practice.

Medium-sized companies

We establish practical and quickly applicable reporting channels, emergency plans and evidence gathering procedures.

Medium-sized companies

We want to ensure that we operate in a compliant and liability-proof manner, even in the event of a ransomware incident.

KRITIS companies

We map your organisation's requirements and create a suitable set of controls and evidence.

KRITIS companies

We must ensure that our outsourcing, operations and testing processes comply with regulatory requirements.

How we advise you

Clarity instead of risk: systematic security

Our information security law consulting services:

  1. Regulatory mapping & applicability: classification of BSIG, NIS2, DORA, CRA and KRITIS; Obligations and schedule.
  2. Information security governance & policies: roles, guidelines, controls, training and continuous improvement.
  3. Risk management & ransomware readiness: risk analysis, action plans, testing and resilience.
  4. Incident response & reporting procedures: processes, deadlines, forensics, communication and lessons learned.
  5. Supply chain & cloud/outsourcing contracts: security requirements, audit rights, SLA and reporting clauses.
  6. Technical & organisational measures (TOM): definition; proof of effectiveness; audit trails.
  7. Compliance documentation & audit readiness: registers, reports, board templates and audit documents.
  8. Awareness & training: target group-specific training (management, IT and specialist departments).
  9. Interfaces with data protection, IT & competition law: coordinated rules for data, products and presence.
  10. Support during proceedings: communication with supervisory authorities/BSI; statements; defence/rebuttal.

Your result

Clear measures, secure contracts, tangible solutions

You know what applies

We assign requirements such as NIS2, DORA, CRA and KRITIS, and then derive the relevant obligations and deadlines.

Your organisation is ready

We define governance, roles, policies and controls, and all of these are clearly documented.

Your contracts provide security

We incorporate security, audit and reporting obligations into contracts with cloud and service providers.

You respond confidently to incidents

We set up reporting channels, emergency processes and procedures for gathering evidence.

Your evidence will pass audits

We organise registers, reports and artefacts for internal and external audits.

Your risk decreases measurably

We prioritise measures, test ransomware readiness and close any gaps.

Free initial consultation

Prioritise your IT security in 30 minutes

Arrange your consultation today

We provide a clear overview of the scope of application, the most pressing gaps and the initial measures in a concise and practical manner.

Raphael Jünemann
Lawyer, Senior Associate | Berlin

Intro

Our motto: secure, radical, digital

SRD is the boutique law firm for digital projects, supporting you from kick-off to go-live. We combine technical innovation with compliance. We create radically clear legal scope for this.

Our awards

Our market solutions

Contact us

Your experts for information security law

Raphael Jünemann

Lawyer, Senior Associate Berlin

Dr. Jan Scharfenberg, LL.M. (Stellenbosch)

Lawyer Berlin

Simone Rosenthal

Lawyer, Partner Berlin

Contact

Bye, bye legal Standby

here's no need to wait for the legal team – we provide clarity at the pace of your project

Arrange an initial consultation