CYBER CURRICULUM® assists you in securing your company to stay one step ahead of the current
cyber threats
iin the digital age.

CYBER CURRICULUM® supports you in securing your company, ensuring you are always one step ahead of the current cyber threats in the digital age.

CyberCurriculum® accompanies you in securing your company in order to stay ahead of the current cyber threatsin the digital age.

Tailored to your needs.

Find your company here?

Find yourself
here again?

From small businesses to large corporations

From empowering national small and medium-sized enterprises to addressing the complex demands of international corporations. Our expertise knows no bounds.


In our team, highly qualified and certified IT security experts come together with strategic business consultants and lawyers, all with one goal in mind. to offer your company the greatest value possible!


We are at your side: from the customized
Consultation through the realization of a comprehensive IT security strategy aligned with national and international best practices.


Our expertise lies not only in strengthening relationships of trust with our valued stakeholders, but also in building a comprehensive and sustainable connection with other relevant interest groups.

What CYBER CURRICULUM® can do for you

Our portfolio

IT – Security

We develop innovative security strategies, carry out comprehensive audits and offer you customized training to ensure that your IT infrastructure is optimally protected and up to date.



We are your reliable partner for individual data protection advice. Our experienced team is at your side to develop customized solutions for your data protection requirements.

Cloud service

We develop sophisticated cloud strategies for our customers to streamline their business processes and optimize cross-team work. Create 100% availability of your resources.

Emergency Response

Emergency Management Our solutions help minimize risks while simultaneously increasing the efficiency of your business operations without requiring additional resource expenditure.

Holistic training

Our training programs offer not only specialist knowledge, but also practical skills to prepare your team in the best possible way for the ever-growing challenges in the digital space. We go beyond theory and promote a deep understanding of current threats and best security practices.

What can CYBER CURRICULUM® do for you?

CYBER CURRICULUM® assists you with both the organizational and technical security of your company. Our Portfolio in the field of Cyber Security includes topics such as Information Security / IT Security, Cloud Security, Emergency Management, and Data Protection.
  • Preparation for certification (e.g. ISO27001, BSI IT-Grundschutz)

  • Optimization of IT-supported business processes

  • Support with data protection requirements

  • Advice on the implementation of (safety) measures

  • Development of continuity strategies and treatment plans (BCMS)

  • Defining a Secure Cloud Strategy

Our team is setting new industry standards.

The leaders of the
Cyber Curriculum®.

The leaders of the
Cyber Curriculum GmbH.

Founder and CEO Niclas Matz and COO Tim Oppold are two outstanding experts in their fields. With their extensive experience and in-depth knowledge, they offer you customized solutions to achieve your security goals. From developing a comprehensive security strategy to practically implementing it and training your team The security of your company is in your hands.

Your benefits

Establish your IT governance, risk, and compliance independently, without relying on external service providers.


Certifications serve as a gauge of the quality and trustworthiness of an organization in the global market.


The compliance structure guides business processes and strengthens the flow of information within your corporate framework.


Our packages provide you with the necessary expertise for your business and increase your autonomy vis-à-vis external parties.

We work with you to develop integrated management
systems on the following topics:

We work with you to develop integrated management systems in the following areas:


Since the European General Data Protection Regulation came into force in 2018, reports of data protection breaches and fines have dominated media coverage in the area of corporate compliance. Do you know what sanctions your company could face if it fails to comply with data protection regulations? Have you already developed effective strategies to ensure data protection in your day-to-day business without any uncertainties? We offer you exactly this: fast and uncomplicated fulfillment of all data protection requirements and a functioning system for your data protection.


Business Continuity Management is a crucial component of every company’s IT emergency preparedness and response planning. It is the responsibility of IT management to develop (or have developed) strategies, plans and measures to protect activities or processes that would cause serious damage or devastating losses to the company in the event of an interruption.

If you are looking for help in identifying and improving your business-critical systems and processes, we are the perfect partner for you. Together with you, we define a goal and then support you in the implementation of individual or holistic measures to ensure optimum and continuous availability for your company.


What is the value of a complex, automated network monitoring system if the door to your data center is not locked? IT security and compliance must always be viewed holistically and systematically to achieve a positive effect: neglecting even a single aspect opens the door to attackers. And this negligence is punished by the legislator through penalties, for example, under the IT Security Act 2.0 (IT-SiG 2.0).

Where just a few years ago there were manually controlled attacks by hackers, today there are automated tools enriched with artificial intelligence that continuously scan all systems connected to the Internet for vulnerabilities. You no longer have to be a selected target of an attack in order to be in the crosshairs of global attackers or even internal perpetrators.

Implementation of IT security measures


First Meeting & Strategy Discussion

In an initial strategy meeting, our team of experts identifies your specific requirements and is available to answer your initial questions. We also find out exactly how we can help you and develop a clear roadmap for possible collaboration.

Conceptualization & Kick-Off Meeting

Based on the knowledge gained, our team develops an individual solution proposal tailored precisely to your project requirements. In doing so, we filter the most diverse approaches to the goal and determine the best and most efficient solution in advance.

Implementation & Deployment

Once the strategy for your project has been approved, our experts will work on efficient and cost-effective solutions for your individual challenges. If you wish, we can also support and advise you from strategic planning through to implementation.

Implementation & Deployment

Finally, the team of experts presents the results achieved and corresponding recommendations for further action. In order to increase the effectiveness of the measures, we also offer to carry out regular audits for continuous improvement after successful integration.


We are expanding our team
and are looking for support!

We are expanding our team
and are looking for support!

Join our CYBER CURRICULUM® team and shape your career with us! If you are interested in exciting challenges in the field of Cyber Security, we look forward to hearing from you. Join our team soon and work with us to develop innovative solutions for leading companies!

  • Paid training opportunities

  • Home office options available upon agreement

  • Flexible and global working

  • Company pension scheme for all employees

Have we caught your Attention?


Do you need a non-binding quote or further information?
Then feel free to reach out to us or book a non-binding consultation appointment.