
Endpoint Protection in the context of NIS2
How controls along the attack chain proactively prevent attacks - is explained in this presentation by Martin Mangold using examples.
Topic
Awareness / Phishing / FraudData security / DLP / Know-how protectionEndpoint ProtectionLegislation, standards, regulationsManaged Security Services / Hosting
When & Where
Details
Format:
Management lecture
Session description
CISOs and ISBs are currently asking themselves what the upcoming legislation means for their company and which areas will be affected. In this short presentation, we will show you how the combination of different Critical Security Controls (CSC) effectively strengthens the resilience of your company.
Businesses interact with customers, suppliers and other stakeholders. Therefore, compartmentalisation to protect against cyber incidents is not possible. Rather, it is important to make the various interactions with third parties robust and secure in terms of cyber threats. Device, application control and awareness are essential controls of all relevant compliance and security regulations.
Businesses interact with customers, suppliers and other stakeholders. Therefore, compartmentalisation to protect against cyber incidents is not possible. Rather, it is important to make the various interactions with third parties robust and secure in terms of cyber threats. Device, application control and awareness are essential controls of all relevant compliance and security regulations.
Moderator
