
Expedition IT-Security: From the e-mail box to the encrypted server
We take you through an exciting but challenging journey - from email hijacking to encrypting your data.
Topic
Awareness / Phishing / FraudEndpoint ProtectionIdentity and access managementSIEM / Threat Analytics / SOC
When & Where
Wed, 10/26/2022, 10:45 - 11:00
Details
Format:
Management lecture
Session description
In this presentation, we explain the challenges you will face on your IT security expedition.
Email hijacking, social engineering, ransomware and fraud attacks are probably the most prominent methods attackers use to compromise your systems and data.
Possible downtime, image damage or ransom demands are the consequence.
Using various threat scenarios, we will talk about how careful preparation, appropriate equipment and the right use of skills - as in an expedition - can reduce the dangers to a minimum.
Email hijacking, social engineering, ransomware and fraud attacks are probably the most prominent methods attackers use to compromise your systems and data.
Possible downtime, image damage or ransom demands are the consequence.
Using various threat scenarios, we will talk about how careful preparation, appropriate equipment and the right use of skills - as in an expedition - can reduce the dangers to a minimum.
Moderator
