CYBER IN CONTROL

Security for the AI era.

Strategic consulting, NIS2 readiness, and AI Security for European SMEs. With a focus on data sovereignty and actually implementable measures.

Get in touch

Why now?

The conditions for cybersecurity have shifted noticeably. Three developments shape the current picture:

  1. NIS2 is taking effect. The EU directive has been in force since October 2024; the Austrian transposition follows in 2026. The scope of obligated organisations expands considerably, accompanied by concrete sanctions for non-compliance.
  2. AI is changing the attack surface. Phishing is increasingly hard to detect linguistically, deepfakes enable new variants of CEO fraud, and LLM integrations introduce additional attack vectors — prompt injection, data poisoning, unintended data exfiltration.
  3. European sovereignty is becoming a selection criterion. Customers and supervisory bodies increasingly question data processing outside the EU. Data sovereignty is evolving into a credible point of differentiation.

My approach: Strategic consulting with implementation depth. Pragmatic roadmaps tailored to the size and maturity of your organisation. Security as an integral part of the business — not as an isolated compliance exercise.

SERVICES

Six concrete building blocks

Strategy, architecture, governance, awareness — designed for SMEs, without enterprise overhead.

Strategic security consulting

Honest analysis of your security posture. Concrete roadmap with quick wins, mid-term measures, and strategic investments.

NIS2 readiness

NIS2 readiness check, gap identification, implementation guidance. Risk management, incident reporting, supply chain security.

AI Security & Governance

Protection against prompt injection, data poisoning, model theft, data leaks. Governance that controls AI use without blocking innovation.

Privacy by Design

GDPR and EU AI Act built directly into the architecture, not retrofitted. With focus on what is actually necessary.

Security architecture

Design of secure IT landscapes. Zero Trust instead of perimeter security. Permission concepts that work with AI agents.

Security awareness training

Realistic phishing simulations, AI-specific risks (deepfakes, voice cloning, prompt engineering tricks).

Deliberate specialisation

MH-Services is strategic consulting with implementation depth. For 24/7 operations, large penetration testing engagements or tool resale, I'm happy to refer you to specialised partners in my network — so you get the right specialist for every need.

In focus

  • Strategy
  • Architecture
  • Governance
  • Awareness
  • NIS2 readiness
  • AI Security

Via partners

  • SOC-as-a-Service
  • 24/7 MDR
  • Large-scale pentests
  • EDR tool resale
APPROACH

How I work.

Day 1–5

Security assessment + stakeholder interviews

Week 2–3

Action plan + prioritization with management

Week 4–8

Quick wins (often 60% of risk reduced with 20% of effort)

Month 3+

Strategic measures + ongoing support

Principle: Security is a process, not a one-off event. I build structures that grow with your organisation and hold up in everyday operations.

FREQUENTLY ASKED

What management and IT leadership typically ask.

Is our organisation subject to NIS2?

NIS2 applies to essential and important entities across 18 defined sectors (including energy, transport, banking, health, digital infrastructure, manufacturing of critical goods, research, postal services, waste, chemicals, food). Base threshold: 50+ employees or €10M annual revenue. Austrian transposition comes into force in 2026. A concrete readiness check clarifies applicability and identifies areas for action.

What penalties apply for non-compliance with NIS2?

Fines are substantial: up to €10M or 2% of global annual revenue (essential entities) and €7M or 1.4% of revenue (important entities). Additionally: personal liability of executive management for demonstrable failure of due care. NIS2 explicitly requires management to oversee implementation of risk-management measures.

What is the difference between a SOC (Security Operations Center) and strategic security consulting?

A SOC is an operational 24/7 service continuously monitoring alerts, handling incidents, performing incident response. Strategic security consulting operates upstream: what actually needs protection? Which risks are acceptable? Which architecture fits the organisation? Which tools are truly needed? MH-Services covers the strategy and architecture layer — for SOC operations, MH-Services refers to specialised partners in its network.

How real are AI-powered attacks — or is this just marketing?

Real and escalating. Concrete current threats: phishing linguistically indistinguishable from legitimate communication thanks to LLMs; deepfake-based CEO fraud (multiple documented cases in the DACH region with seven-figure losses); prompt injection in LLM integrations causing data exfiltration or flawed decisions; voice cloning bypassing phone-based verification. These vectors have outpaced traditional awareness programmes.

What does "European data sovereignty" mean in practice?

Three practical dimensions: legal framework (data subject to EU law, not US law such as the CLOUD Act), infrastructure location (processing in EU data centres, not just "data residency"), vendor control (provider under EU jurisdiction, no obligation to disclose data to US authorities). Implementable options: EU cloud providers (Mistral, Scaleway, OVHcloud, StackIT), on-premise, or German/Austrian hosters.

Our team already uses ChatGPT for work — how do we govern this?

Shadow IT with LLMs is the rule, not the exception. A pragmatic three-step approach: 1. Transparency (inventory instead of ban — who uses what, for what), 2. Guardrails (clear guidelines: which data into which tools, company accounts with enterprise SLAs instead of personal subscriptions), 3. Alternatives (where it makes sense: internal LLM access with audit trails and data-protection safeguards). This turns shadow IT into governance-compliant use.

How long does NIS2 preparation realistically take?

Full readiness for a mid-sized organisation: 4–6 months, broken into assessment (week 1–3), action plan and prioritisation (week 3–5), quick wins (week 5–10 — often 60% of risk reduction in 20% of effort), strategic measures (month 3+, ongoing). The timeline depends on the starting position; a first solid assessment is available within a few days via a NIS2 readiness check.

CONTACT

Let's talk.

Write me a short message about what you need — I'll get back to you personally within one working day.