This page is fully or partially automatically translated.

Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Forums it-sa Expo Knowledge Forum D

Digital Transformation and Cybersecurity Regulation: Legal Requirements, Solution Approaches and Opportunities

- Infrastructure
- Competence
- Processes for detection and response

calendar_today Tue, 25.10.2022, 10:00 - 10:15

event_available On site

Action Video

south_east

Action description

south_east

Speaker

south_east

Product

south_east

Themes

Legislation, standards, regulations Trend topic Data protection / GDPR Data security / DLP / Know-how protection Education and training Network Security / Patch Management

Event

This action is part of the event Forums it-sa Expo

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description


The German Federal Office for Information Security (BSI) has published a draft guide on the use of attack detection systems (SzA). Currently, the evaluation of comments on the community draft is underway, which regulates the requirements for operators of critical infrastructures such as, among others, operators of energy facilities and energy supply networks and for testing bodies.
The implementation of the measures of systems for attack detection is measured and presented via a maturity level. This maturity level is used for the verification according to § 8a paragraph 3 BSIG and § 11 paragraph 1e EnWG.

The presentation explains what operators must, should or can implement in order to
1. build up both the necessary infrastructure with regard to attack detection systems,
2. acquire the competence to operate these systems and
3. implement the processes for detection and response in accordance with BSI requirements
... read more

Language: German

Questions and Answers: No

Speaker

show more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.