Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Forums it-sa Expo Knowledge Forum D

Underestimated risks in the home office

In the sum of supposedly uncritical information lies an often underestimated danger for companies and authorities, especially in the home office.

Underestimated risks in the home office
- How do long-term attacks work
- What other risks are there in the home office
- Measures for effective protection against attacks

calendar_today Wed, 13.10.2021, 11:45 - 12:00

event_available On site

place Hall 7A, Booth 7A-106

Action Video


Action description







Awareness / Phishing / Fraud Secure Homeoffice Endpoint Protection


This action is part of the event Forums it-sa Expo

Action Video

grafischer Background

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

Download Handout - PDF

When handling their data, companies and public authorities often use graduated security measures. What is particularly important and critical is also particularly well protected. For information that is (supposedly) less worthy of protection, on the other hand, the level of security may be lower. An approach that makes sense from a commercial and operational point of view and is a foundation of common information security management systems.
IT security expert Gerald Richter shows how even supposedly unimportant data can be used to obtain information that allows cyber criminals to attack and compromise the IT infrastructure of companies and public authorities. Home office workstations are a particularly good starting point. The information obtained, which may be collected over a longer period of time, then allows conclusions to be drawn about structures, relationships and habits within the organization. These can then form the basis for the successful execution of social engineering attacks, for example, but also for compromising less important user accounts, which in turn serve as a starting point for further propagation in the IT infrastructure.
Translated with (free version)
... read more

Language: German

Questions and Answers: No


show more

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.