This page is fully or partially automatically translated.

Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Header of DriveLock SE
Forums it-sa Expo 2023 Knowledge Forum E

Endpoint Protection in the context of NIS2

How controls along the attack chain proactively prevent attacks - is explained in this presentation by Martin Mangold using examples.

calendar_today Thu, 12.10.2023, 10:30 - 10:45

event_available On site

place Hall 7A, Booth 7A-102

Action Video

south_east

Action description

south_east

Speaker

south_east

Themes

Awareness / Phishing / Fraud Data security / DLP / Know-how protection Endpoint Protection Legislation, standards, regulations Managed Security Services / Hosting

Key Facts

  • The upcoming IT Security Act 3.0 simply practised in Controls.
  • What specifically needs to be considered for end devices?
  • Different controls directly from one solution

Organizer

Event

This action is part of the event Forums it-sa Expo 2023

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

CISOs and ISBs are currently asking themselves what the upcoming legislation means for their company and which areas will be affected. In this short presentation, we will show you how the combination of different Critical Security Controls (CSC) effectively strengthens the resilience of your company. 

Businesses interact with customers, suppliers and other stakeholders. Therefore, compartmentalisation to protect against cyber incidents is not possible. Rather, it is important to make the various interactions with third parties robust and secure in terms of cyber threats. Device, application control and awareness are essential controls of all relevant compliance and security regulations.
... read more

Language: German

Questions and Answers: No

Speaker

show more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.