Unsupported Browser! This website will offer limited functionality in this browser. We only support the recent versions of major browsers like Chrome, Firefox, Safari, and Edge.

Internal control system (ICS) - focus on stability and quality

Your security as a strategic success factor

An internal control system (ICS) is the central tool within an organization for error prevention, quality assurance and compliance. It focuses primarily on current and past processes: Through systematic controls and defined roles, risks are identified early and minimized before they can lead to major problems.

What constitutes an ICS

A professional ICS is based on tried-and-tested control models such as COSO or COBIT and serves as a management tool with the following objectives:

  1. Compliance with guidelinesCompanyguidelines and legal regulations are consistently implemented witheffective controls.
  2. Protecting the companyClearprocesses and IT systems reduce the risk of damage by identifying error and fraud risks at an early stage.

Basic requirements for an ICS

  • Transparency: Enabling a target/actual comparison that also provides external stakeholders with an insight into process quality.
  • Separation of functions: Critical processes (e.g. in the purchasing process) are distributed among several responsible parties in order to prevent manipulation or misuse.
  • Four-eyes principle: Important processes are always checked to detect errors and increase the reliability of information.
  • Need-to-know principle: Employees only receive the access rights and information they really need – an important factor for data security and compliance.

ICS and risk management - similarities and differences

While the ICS focuses primarily on the present and the past, risk management is more future-oriented. The focus here is on the future:

  • Identify
  • Avoid
  • Reduce
  • Acceptingrisks.

However, both systems pursue similar goals:

  • Compliance with rules
  • Minimization of hazards
  • Reliable operational information
  • Protection of company assets

The combination of ICS and GRC systems (Governance, Risk & Compliance) offers great synergy effects and helps to reduce redundancies.

ICS in a common management system: advantages with QSEC

An integrated software solution such as QSEC combines ICS, ISMS and GRC in a single management system and thus optimally supports all those who bear responsibility for IT security, data protection or risk management. The main advantages are

  • Centralized and standardized data storageAvoidance ofduplicate data collection and thus a clear overview of all relevant information.
  • Multi-standard complianceAsystem for different standards (e.g. ISO 27001, GDPR) so that audit requirements are met efficiently.
  • Automated processesPredefinedworkflows speed up checks and approvals, saving time and resources.
  • Integration of relevant business processesFromthe purchasing process to IT security: all key processes can be seamlessly mapped in QSEC.
  • Clear, transparent reportsValidateddata provides management with a reliable basis for making decisions on risk and security status.
  • Role-based rights managementThanks toclear roles (e.g. process owners, coordinators, controlling), the dual control and need-to-know principle is consistently implemented.

KPI-based risk methodology in QSEC

QSEC also supports you with meaningful key performance indicators (KPIs) that precisely underpin your risk assessment and management:

  1. Risk-bearing capacity
    • Formula example: (equity, liquid funds, risk coverage contribution) / total risk value
    • Key questions:
      • Are the risks commensurate with the available funds?
      • Can the risks be borne by the company?
      • What recommendations for action can be derived (e.g. disinvestment in high-risk business areas)?
  2. Budget planning
    • Formula example: Available risk budget / total risk value
    • Objective: To check whether the planned risk budget can cover potential losses.
  3. Planned operating sales
    • Formula example: Planned turnover – total risk value
    • Question: Is the expected turnover appropriate in relation to the underlying risks?

These KPIs provide you with a sound basis for making decisions in order to adjust your risk strategy in a targeted manner and secure the financial balance of your company.

What our customers say

  • In summary, we are very satisfied with the performance of QSEC and will continue to develop and use the software intensively in the future. The manufacturer of the software, Nexis GRC, is a reliable partner for us, always providing us with the best possible support thanks to its decades of experience in implementing global GRC and ISMS projects.
  • In the end, QSEC was convincing in the cost-benefit analysis and in terms of scalability as a single-source tool. QSEC supports the dissemination of a uniform understanding of processes. The system acts as a central platform in which all business processes are recorded.

  • In Nexis GRC, we have found a partner that speaks our "language" and responds openly to our requirements and ideas. The partnership with Nexis GRC has convinced me throughout the entire duration of the collaboration.
  • Auditing our infrastructure has become much easier and more efficient with the support of QSEC. Based on the auditors' positive assessment of the system's performance, we will continue to expand QSEC in line with our requirements.
  • The methods and processes already integrated in the standard QSEC have significantly supported us in the professional development and operation of our information security management system. The maturity assessment and development enable us to continuously operate, monitor and further develop our Techem ISMS with QSEC in a resource-saving manner.

Selected
success stories

DSW21 on the successful introduction of an Information Security Management System (ISMS) with QSEC

Cancom on the global introduction of an Information Security Management System (ISMS) in accordance with ISO/IEC 27001 with QSEC

Techem on the challenges and experiences in information security and risk management with QSEC

Harzklinikum Dorothea Christiane Erxleben on software-supported security management in accordance with B3S Health, ISO 27001 and GDPR with QSEC

HanseMerkur on the development of a holistic management system taking into account the insurance law aspects according to VAIT

Take action now: Take the next step with QSEC!

Rely on holistic information security management that meets your requirements - QSEC is a reliable partner at your side.

Request a live demo:

Experience QSEC in action and let us show you how our ISMS software solves your challenges.

Download ISO 27001 checklist:

Find out which steps are crucial for a successful information security management system.

Personal advice:

Speak directly to our experts to develop your individual roadmap for sustainable information security.

Upcoming
Expert Sessions

06.06.2025: Webinar Reihe - Fit für die DORA-Verordnung!

Starten Sie mit unserem ersten Webinar "DORA und Ihre Synergieeffekte: Der goldene Weg zur digitalen Resilienz". Lernen Sie, wie Sie bestehende Prozesse optimal für die DORA-Anforderungen nutzen können. Alle Teilnehmer sichern sich exklusiv den Zugang zu unserem vertiefenden Folge-Webinar zum Informationsregister.

Datum: 06.06.2025

Time: 11:30 a.m. - 12:00 p.m.