-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathfeed.xml
More file actions
63 lines (53 loc) · 2.64 KB
/
feed.xml
File metadata and controls
63 lines (53 loc) · 2.64 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
<title>PeakMaven</title>
<link href="https://www.peakmaven.com/feed.xml" rel="self" />
<link href="https://www.peakmaven.com" />
<updated>2022-12-06T15:20:44+01:00</updated>
<author>
<name>Stefan Langwald</name>
</author>
<id>https://www.peakmaven.com</id>
<entry>
<title>Your partner in all things cyber security.</title>
<author>
<name>Stefan Langwald</name>
</author>
<link href="https://www.peakmaven.com/peakmaven-is-a-cyber-security-consultancy/"/>
<id>https://www.peakmaven.com/peakmaven-is-a-cyber-security-consultancy/</id>
<updated>2022-12-06T15:20:44+01:00</updated>
<summary>
<![CDATA[
Advisory & Implementation. We support you in the implementation of your IT security and stand by your side with know-how and experience. Training. Expand your technical and organizational know-how and create more security awareness among your employees. Compliance. Is your business is considered critical infrastructure? Do you need…
]]>
</summary>
<content type="html">
<![CDATA[
<p class="align-center">
<span style="color: var(--text-primary-color); font-family: var(--editor-font-family); font-size: 1em; font-weight: var(--font-weight-normal);"></span>
</p>
<h2 id="services">
Services
</h2>
<p>
<strong>Advisory & Implementation. </strong>We support you in the implementation of your IT security and stand by your side with know-how and experience.
</p>
<p>
<b>Training.</b> Expand your technical and organizational know-how and create more security awareness among your employees.
</p>
<p>
<b>Compliance.</b> Is your business is considered critical infrastructure? Do you need to comply with any regulatory framework before the next funding round? We help you to achieve any objective.
</p>
<p>
<b>Certification. </b>Build trust and verify information security with official certification. We accompany you through the audit. No matter if ISO 27001, SOC/2, or PCI-DSS.
</p>
<p>
<b>Audit. </b>We carry out internal audits for you, at your premises or at your suppliers. And we provide potential for improvement with concrete recommendations.
</p>
<p>
<b>GDPR.</b> We help your business in all matters for GDPR compliance.
</p>
]]>
</content>
</entry>
</feed>