Select Page

Cybersecurity

It’s not a question of IF, it’s a question of WHEN you will be attacked.

We provide an analysis of your Cybersecurity maturity and ensure your business is safe.

Comprehensive analysis

Risk Assessment, making of a plan with method, in a week we will see where we can provide value for your company, and tell you what you should do first, with or without us. You will benefit from our unique angle of view as SAFe practitioner and transformation experts to make it a smooth ride.

We strive to openness and security by design, not by obscurity.

We also act as a Managed Service Provider (MSP)

  • Credential & Access Management
  • GDPR compliant procedures
  • Security Operation Center (SOC)
  • Endpoint Detection & Response (EDR)
  • Pentest

1-A Single Agenda Encompassing Purpose, Values, Reality, and Energy

1-A Single Agenda Encompassing Purpose, Values, Reality, and EnergyThere can only be one agenda--not two, three or more. Your agenda must take into account four factors for orientation. That's it. Keep it simple! But aren't four characteristics too few? And in this...

2-Neither “Flat Hierarchies,” Nor Mere Consensus: Leadership Based Upon Competence

2-Neither "Flat Hierarchies," Nor Mere Consensus: Leadership Based Upon CompetenceTear down the chain of command and start over? What could be more beautiful than equality and consensus? It sounds nice, but it doesn't work out in practice--especially when dealing with...

Augmented Leadership©.

The Augmented Leadership Manifesto12 principles, 12 pillars. The Acropolis of Swarm Intelligence. If a column is missing, the swarm cannot fly.StatementWe cannot solve problems with the mindset that they were created. When projects fail, the root cause is always bad...

Introduction to Augmented Leadership

My name is Rosho; I work as a Transformational Consultant, Lean-Agile Enterprise Architect, and Scaled Agile Program Manager/Consultant in my company Rosho.World UG in Berlin/Germany. I work for major global corporations, as well as SMEs and Startups all over the...

The InterTaG Project

The world is a project and the method is the solution. Does the world need another Internet? The Internet of Information has been around for some time, followed by the Internet of Assets, the Internet of Things (IoT) and the Internet of Energy. What is missing? What...

Agile/Adaptive vs. Waterfall? A big Misunderstanding!

Scaled Agile, Adaptive Business, combined with Distributed Competence & Responsibility Management, also called Self-Organisation, are the most powerful and engaging ways of working together. We design, implement, coach, mentor and teach the future of work and...

Stragedy, Strategy or Tragedy

I went to Italy recently, twice, to Rome and Sicily, visited a bit, and talked to some colleagues there. In Rome, we were staying a few meters away from the Vatican and a dear friend told me about the notion of "stragedy" of politics in Italy. Obviously, the friend...

Qi Gong of the Soaring Crane

Soaring Crane Qi Gong is among the most powerful tools to connect body, heart, mind and soul and balance out life. It helps developing empathy.

The Magic of the Ontology Map

What is an ontology? Roughly 2500 years ago, during Fifth Century BC, in a remote province town called Elia, Province of today's Salerno in Southern Italy, part of the Greater Greece, a smart guy called Parmenides developed the concept of ontology, as a philosophic...

Current IT Systems: End of Lifecycle

Digital Transformation is one thing, managing risks is the other one! If we do not transform profoundly, the systemic risk of disruption of service raises. We can see more and more outages, more difficult to repair, with bigger impact. The Entropy Quotient sky-rockets...

We are not only consulting for you, we are also implementing and training for your teams.

Employee Awareness & Training

 

Password management

Endpoint Detection Response to treats

The Three Pillars

Confidentiality

Consistency

Availability

Customer& Value Centric Policies

All our solutions will help you shape and refine your company policies.

including state of the art Disaster Recovery Plan, with full backup 3-2-3 for your precious data & systems, a proper contingency plan when some roles are missing in action, whatever the reason.

ROAM* your risks away.

‘Resolve, Own, Accept, and Mitigate’

Ask our customers if you are not convinced!

Hysilabs

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

Name Goes Here

AIDA

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

Name Goes Here

Expath

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

Name Goes Here