This page is fully or partially automatically translated.

Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

it-sa 365: Header Desktop genua
IT Security Talks Technology I

IT-SiG2.0: Why attack detection is more than just a tick mark in the audit report

Becoming IT-SiG-compliant in KRITIS and OT: By means of a live demo, we show how attack detection effectively prevents insider attacks.

calendar_today Wed, 14.04.2021, 10:00 - 10:15

event_available Digital

Action Video


Action description







Industry 4.0 / IoT / Edge Computing Network Security / Patch Management



This action is part of the event IT Security Talks

Action Video

grafischer Background

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

The IT Security Act, or IT-SiG for short, places new requirements on operators of critical infrastructures. It obliges them to report extraordinary IT disruptions to the BSI that have led to a supply failure - or could lead to such a scenario. The IT Security Act 2.0 is expected to be passed this spring. It anchors anomaly detection for CRITIS companies and organisations. The implementation period to take the necessary precautions will then be only one year.

Therefore, special attention in cyber defence must be paid to attack detection in the future, not only for CRITIS but also for OT. After all, the ever-growing potential for disruption through unregulated network access, e.g. via remote maintenance connections, leaves many plant operators with a queasy feeling as well as the desire for secure solutions and effective but reaction-free monitoring of plant networks; not only to comply with regulation, but to realise a real gain in security.

Through a live demo, we will show how active but non-reactive monitoring of network traffic with real-time reporting, behaviour modelling and analysis using cognitix Threat Defender works to detect threatening or reportable cyber-attacks in real-time. And we will attempt an insider attack via a remote maintenance channel and show how it is effectively defended against in real time.

Translated with (free version)
... read more

Language: German

Questions and Answers: Yes


show more

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.