The Cybervize platform is one solution that grows with you, from a 200-person owner-led mid-market company to a 50,000-person corporate. Modules are licensed, all share the same data layer, permission model and audit trail. A continuous information flow instead of isolated silos. Adoption takes two clear paths: with a virtual CISO as a bundle (permanent security function) or as a platform licence with an onboarding project (for organisations with an in-house CISO).
Information security management per ISO 27001. Organizational structure, BIA, incident management with regulatory reporting (GDPR 72h, NIS-2, KRITIS), asset inventory with dependency graph, dual risk assessment, measure tracking, controls and Statement of Applicability.
Assessment
Questionnaire-based security assessments against any standard. OSCAL import (BSI Grundschutz, NIST SP 800-53, IEC 62443), multi-site campaigns, automated scoring, audit-proof snapshots and automated reports with built-in LLMs (PDF, Excel, PowerPoint).
BCM
Business Continuity Management per ISO 22301. Continuity plans with RTO validation against BIA data, threat scenarios, gap analysis, BCM tests (tabletop to full exercise), compliance score and management reviews with auto-populated KPIs.
TPRM
Third-Party Risk Management per EBA guidelines. Automated criticality assessment, contract register with 19 EBA mandatory fields, subcontractor chains, due diligence, concentration risk, exit strategies and cross-app impact analysis.
The Platform in Action
Insights into the key modules and features.
Risk Management
All risks at a glance with assessment, affected assets and treatment status.
Incident Management
Security incidents with priority, deadlines and automatic overdue detection.
Security Assessments
Questionnaires for ISO 27001, IEC 62443 and more. Multi-site campaigns with automated scoring.
Site Comparison
Maturity and scores of all sites in direct comparison. Track trends over time.
Modules that complement each other
No silos. Defined interfaces between all modules.
AssessmentISMS
Gaps automatically generate measures
ISMSBCM
BIA data validates BCM plans. Test failures create measures
TPRMISMS
Supplier risks linked to assets and incidents
BCMTPRM
Critical suppliers create threat scenarios
Platform core. Always available.
Multi-tenant
Strict data isolation. Consultants work across tenants without mixing data.
Segregation of duties for approvals, snapshots, risk acceptances and measure completion.
Audit trail
Every action logged. Who, when, what, from which IP. CSV export for auditors.
Supported Standards
ISO 27001:2022
ISMS
ISO 22301
BCM
NIS-2 / GDPR / KRITIS
ISMS
NIST SP 800-53
Assessment
BSI Grundschutz++
Assessment
DIN SPEC 27076
Assessment
IEC 62443
Assessment
EBA/CP/2025/12
TPRM
Which answers management and supervisory boards get from the platform
Five management questions every board should have ready for the supervisory board, the external auditor and the insurer. The platform delivers them on demand, not as an IT translation exercise.
01
Which decision can I make better afterwards?
Investment prioritisation based on quantified risks. Top-10 risks with mitigation status and budget annotation, sorted by business impact. You know which 20 percent of measures deliver 80 percent of risk reduction.
02
Which evidence do I have for regulators, customers and auditors?
On-demand reports with audit trail, ISO 27001/NIS-2 status, sector-specific evidence (DORA, IEC 62443, TISAX). Exportable as PDF, Excel and PowerPoint. Every statement is documented with timestamp, owner and source.
03
Which risks are accepted, open or overdue?
Risk register with status, owner, due date and 12-month trend. Accepted risks have documented reasoning, open risks have owners and deadlines, overdue risks are flagged as such. No more hidden risk lists.
04
What does risk reduction cost?
Measure tracking with budget annotation per measure. You see which funds have been released for which risk reduction, what has already been spent and which measures sit without budget.
05
Who is accountable?
RACI model with clear owner roles per control and measure. Before every supervisory-board meeting you can name who owns which measure, instead of searching at the next escalation.
For mid-market and corporates
The same platform, in two levels of expansion. Mid-market companies get enterprise substance in the tool. Corporates get enterprise substance at mid-market pace.
For mid-market
Owner-led, classically 50 to 500 employees, and hidden champions up to several thousand.
NIS-2 readiness in 8 to 12 weeks instead of a year-long advisory project
Fixed prices, no open T&M
vCISO entry from €3,600/month instead of a full-time CISO hire
One IT lead can run the platform with light onboarding support
For corporates
Publicly listed or family-controlled, multi-entity, multi-country, regulated industries.
Group-wide ISMS framework across subsidiaries and plants
Consolidated reports at group, site and working level
Auditor-accepted evidence for external auditors and supervisory boards
Migration from established GRC suites (RSA Archer, MetricStream, ServiceNow GRC)
The right features for every role
Executive Board & Management
Compliance status at a glance. NIS-2, ISO 27001 and DORA progress as a dashboard. Risk heatmap for informed decisions. Audit-proof evidence for regulators.
CISO & Security Team
Incident lifecycle, risk management, assessment campaigns and measure tracking in one system. 16 roles with fine-grained permissions. Playbooks for structured incident response.
Auditors & Compliance
Cross-module read access, audit-proof audit trail, immutable assessment snapshots, automated reports (PDF, Excel, PowerPoint). SoA with implementation status.
IT Service Providers & Partners
Multi-tenant platform for your clients. Offer assessments, ISMS and risk management as a service. Strict data isolation, volume pricing, automated reports.
Data & AI Sovereignty
Hosting and data processing exclusively in Germany with a German provider.
AI under your control: Bring your own API keys (OpenAI, Azure, Anthropic, Ollama) or use the managed service. Encrypted storage. Configurable token budgets.
GDPR-compliant with full data export, anonymization and scheduled data deletion.
Data residency Germany
Self-operated LLM without external data sharing
Encrypted storage of all API keys
GDPR: data export, anonymization, scheduled deletion
Two paths to a productive platform, plus an emergency service
The Cybervize platform works for mid-market and corporates. How it becomes productive depends on whether you already have a CISO. Alongside sits the Interim CISO as a standalone emergency line, usually without the platform.
vCISO: platform with a permanent CISO function
For organisations without an in-house CISO: the platform plus a virtual CISO who permanently fills the security function. 2 to 6 days per month depending on size. Includes risk analysis, NIS-2 gap check, C-level reporting. From €3,600/month for mid-market, project-based for corporates.
For organisations bridging a short-term gap: CISO vacancy, audit preparation, post-incident stabilisation or transition phases. Senior CISO on site, project-based, usually without the platform. No dependency on the Cybervize platform required.
Because ISMS compliance for mid-market companies was too long sold as an Excel sheet, a PowerPoint deck and an hourly consulting model, instead of as an operational system.
Alexander Busse founded Cybervize in 2021 as a consulting practice, after 25 years of experience in information security and cybersecurity, with stations as Partner at PwC and Director at Deloitte. The early engagements revealed a recurring pattern: clients received well-documented risk registers, action lists and compliance reports, yet what remained at the end of the engagement were Word documents and Excel sheets that no one maintained in day-to-day operations.
In 2023, that observation led to Cybervize Operations GmbH as a second pillar. It codifies the consulting methodology into a platform: ISMS, BCM, Assessment and Third-Party Risk Management with one data layer, one audit trail, one permission model. The platform was built during a 14-month research and development partnership with the CISPA incubator, the Helmholtz Center for Information Security, under the BMFTR StartupSecure programme.
Today, Cybervize comprises two independent companies: Cybervize Consulting GmbH delivers vCISO and Interim CISO engagements, while Cybervize Operations GmbH licenses the platform to mid-market and enterprise clients. The consulting practice came first and now carries the platform; the platform is the durable artefact that grew out of consulting.
Frequently Asked Questions about the Cybervize Platform
How is the Cybervize Platform structured?
The platform consists of a platform core (multi-tenant architecture, 4-layer permission model, audit trail, AI service) and four licensable modules: ISMS (Information Security Management), Assessment (questionnaire-based security assessments), BCM (Business Continuity Management per ISO 22301), and TPRM (Third-Party Risk Management per EBA guidelines). Plus an optional integrations module for third-party systems.
How do the modules work together?
All modules share the same data layer and complement each other through defined interfaces: Assessment gaps automatically generate ISMS measures. BIA data from ISMS validates BCM plans. Critical supplier ratings in TPRM create BCM threat scenarios. The asset dependency graph connects ISMS assets with supplier risks. This creates a continuous information flow instead of isolated silos.
Which standards and regulations are covered?
ISO 27001:2022 (ISMS), ISO 22301 (BCM), DIN SPEC 27076, NIST SP 800-53 Rev. 4+5, BSI Grundschutz++, IEC 62443 (all via Assessment with OSCAL import), EBA/CP/2025/12 (TPRM), plus GDPR, NIS-2, BSIG and KRITIS reporting obligations (ISMS Incident Management). New frameworks can be added via OSCAL import in minutes.
How does the AI integration work?
A central LLM service is available to all modules. Use cases: assessment answer suggestions, TPRM contract analysis and criticality assessment, TPRM document analysis, and measure recommendations from assessment gaps. Companies can bring their own API keys (OpenAI, Azure, Anthropic, Ollama) or use the managed service. Token budgets and fallback behavior are configurable.
How is the permission model structured?
Four layers: 1) Module license determines which modules are visible. 2) RBAC with 16 predefined roles (e.g., risk manager, assessment reviewer, BCM manager, TPRM analyst, auditor). 3) ABAC for field-level conditions. 4) Entity scoping restricts users to specific organizational units. Critical actions require four-eyes principle (Segregation of Duties).
Can the platform integrate with existing systems?
Yes, via the integrations module with configurable connectors for CMDB, Jira, ServiceNow, and SIEM/SOAR. Supports API key, OAuth2, Basic Auth and Bearer Token with configurable field mapping. Sync direction: pull, push or bidirectional. Webhook reception with HMAC-SHA256 signature verification.
Where is the data hosted?
Hosting and data processing exclusively in Germany with a German provider. AI models are self-operated, no data shared with external model providers. GDPR-compliant with full JSON data export, anonymization, and scheduled data deletion.