Structural Drift
Dependencies across processes, IT systems, and stakeholders are notoriously difficult to maintain and sync.
Pinnipedia accelerates BSI IT-Grundschutz workflows from weeks to hours for cybersecurity consultants.
The Problem
Security projects stall when dependencies and mappings must be maintained across incomplete, evolving documentation.
Dependencies across processes, IT systems, and stakeholders are notoriously difficult to maintain and sync.
Propagating Protection Needs (CIA) reliably requires handling complex inheritance rules and deviations without failure.
Mapping IT-Grundschutz building blocks is a grind. Completeness checks often lag behind project reality.
The Standard
Pinnipedia is not a replacement, but an amplifier. It automates high-volume processing while keeping the expert in absolute control.
Every proposal and mapping is linked back to customer evidence, ensuring full audit trails and decision reasoning.
Reduce delivery cycles from weeks to hours with automated structural analysis and propagation.
Evaluate fit for your consulting workflow. Early onboarding prioritizes structured feedback and direct pilot collaboration for Tier-1 partners.
Knowledge Graph Driven
Our knowledge graph captures the full complexity of IT-Grundschutz relationships—processes, applications, infrastructure, and protection needs—all interconnected with unmatched accuracy.
Every relationship between Modules, protection needs, and assets is validated by multi-agent systems ensuring zero errors in complex dependency chains.
What takes weeks with traditional tools happens in hours. Scale your client capacity without sacrificing quality.
Policy changes, new compliance requirements, or structural updates propagate automatically through the graph with zero manual intervention.
Every decision, mapping, and propagation is logged with complete traceability. Human oversight at every critical step.
Core Features
Pinnipedia structures customer evidence into a high-fidelity model, proposing traceable outputs while keeping the expert in control.
The Blueprint
Five distinct steps, engineered for professional review and absolute accountability.
Deduplicate documents and exports into a unified structural model.
Confirm assets and roles. Delegate validation tasks with oversight.
Instantly find missing information with links to original sources.
Approve suggested Modules with captured rationale.
Export submission-ready documentation for ISO certification.
Conservative by design: every automated output is linked to evidence and requires explicit approval.
Confidentiality
Conservative German hosting, modern MFA, and granular auditability as standard.
Germany-based GmbH. SaaS hosted in Germany on Telekom Cloud.
MFA and full activity trails for all structural changes.
Encrypted transport/storage with professional redundancy.
The Team
World-class expertise in cybersecurity, AI, and compliance frameworks.

Co-Founder
Independent consultant with 30+ years experience including 24 years at McKinsey, leading technology consulting across Scandinavia, Germany, Eastern Europe, and Middle East. Expert in IT risk management and cybersecurity.

Co-Founder
Professor of Cybersecurity and Artificial Intelligence at the Free University of Berlin (funded by Bundesdruckerei GmbH), DFG Heisenberg Fellow. Research focus areas include Large Language Models (LLMs), AI explainability, privacy-preserving AI, trustworthy AI, and LLM reasoning. Visiting professor at Georgia Tech and Stanford University.

Advisor
Professor of Information Security at Freie Universität Berlin, Head of Department at Fraunhofer AISEC. Former BSI cryptologist (2003-2008) and official at BMI (2008-2013). Research: post-quantum cryptography, electronic identities, information security management.

Advisor
Professor of IT Security at Berlin University of Applied Sciences and Technology. Former BSI: development of end-to-end encryption systems. Federal Ministry of Interior: IT security for business and critical infrastructure. Research: cryptography and machine learning.
Questions
Professional answers for consultant requirements.
No. It automates evidence processing. Consultants remain legally and professionally responsible for all final deliverables.
All outputs are schema-validated and evidence-linked. Unsupported results are explicitly flagged for manual intervention.
Yes. Task delegation allows stakeholders to provide evidence directly while the consultant maintains control.
Available for enterprise partners via Contact Sales. Includes specialized onboarding and technical support.