This page is fully or partially automatically translated.

Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

it-sa Congress G Data
Congress@it-sa Congress

IT security via the cloud: What are the benefits of "managed" or "as-a-service" products?

We show through live hacking how attackers break into IT systems and how a holistic defence concept can protect.

calendar_today Tue, 10.10.2023, 14:30 - 16:00

event_available On site

place Room Singapur, NCC Ost

Action description







Awareness / Phishing / Fraud Cloud Security Endpoint Protection Governance, Riskmanagement and Compliance Managed Security Services / Hosting

Key Facts

  • Only a holistic approach protects from current threats
  • Enforcement is often more difficult than implementation
  • There are no silver bullets in IT security


This action is part of the event Congress@it-sa

Action description

Phishing, security breaches, attacks from within: Nowadays, companies have to protect themselves against a wide variety of cyber dangers.

In this workshop, we will highlight the most common risks and present sensible strategies to ward them off - including: 

  • the regular training of employees
  • Early detection and response to attacks through an endpoint detection and response solution.
  • Hiring an EDR service with advice from well-trained, external experts (MEDR / MDR).

We show why only a holistic approach can meet modern security requirements and why there are no silver bullets. In doing so, we give concrete examples and demonstrate live how cyber attacks take place and how you can best protect yourself against them.

You will leave our workshop with concrete recommendations for action and argumentation aids for implementation.

... read more

Participation Limit: 55

Language: German

Questions and Answers: No


This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.