TISAX® audit by ISMS based on ISO/IEC 27001 standard

How important is the security of our customers to us?

University4Industry guarantees customers the highest level of information security and has taken the TISAX® assessment.

The TISAX® assessment is an audit system that ensures information security in the automotive industry and creates a uniform level of information security. Based on the information security questionnaire of the German Association of the Automotive Industry (VDA ISA), University4Industry has implemented extensive measures to protect information and has taken the TISAX® assessment.

For Jan Veira, head of the ISMS (Information Security Management System) team and managing director of University4Industry, a broadly established understanding of information security within the company is important:

Jan Veira

"Ever since our company’s foundation, we have been guided by the highest security standards because we are convinced that companies who train other companies in security topics should themselves meet the highest standards. Now that we can count the automotive industry as well as the mechanical and plant engineering industry among our customers, it was an important step for University4Industry to officially act on the information security we teach."

Jan Veira
What are the security standards at University4Industry?

We work based on the current VDA ISA catalog (and thus in accordance with the ISO/IEC 27001 standard).

We have our own internal ISMS according to the criteria of TISAX® / VDA ISA.

Our employees refresh their knowledge of information security in monthly ISMS trainings.

Particularly strict security rules apply in the home office and on business trips.

We ensure the confidentiality, availability, and integrity of our customers’ data by

  • preventing damage as far as possible through employee training, software updates and evaluations,
  • having our ISMS team constantly on the lookout for attacks and data leaks,
  • being prepared to respond immediately in the event of an actual incident, minimizing the damage and then correcting the information security failures.

Have we sparked your interest?

We will be happy to explain further details to you or give you test access to our learning content.

Follow Us

Contact us for more information