Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

action image header it logic
Forums it-sa Expo 2023 Knowledge Forum E

Your cyber security strategy - How can you defend your business?

Who and what helps how?

calendar_today Wed, 11.10.2023, 10:45 - 11:00

event_available On site

place Hall 7A, Booth 7A-102

Action Video

south_east

Action description

south_east

Speaker

south_east

Themes

Awareness / Phishing / Fraud Identity and access management

Organizer

Event

This action is part of the event Forums it-sa Expo 2023

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

Technology trends such as Cloud, Big Data, DLT, AI and IoT make our world more convenient for the user, but also increase the area for attacks from cyberspace on your company and your data. 
According to the National Security Strategy (NSS), cyber security is a joint task of the state, business, science and society and involves a high degree of personal responsibility.
 
So when it comes to the concrete protection of your company, those responsible are often left alone and get many different answers to one question.
In view of advancing digitalisation, the shortage of skilled workers and the increasing number of attacks from cyberspace, concrete strategies are needed to protect against ransomware, phishing, CEO fraud, DDos, SQL injection attacks and more in order to remain able to act and remain competitive.
 
In addition, attacks via backdoors in bought-in products (e.g. Solarwinds or the motherboard from GigaByte), so that one also has to keep the supply chain of the products used under control.
What does an effective integrated security strategy look like? How do companies ensure confidentiality, integrity and availability of the data they need? 
 
The technologies available on the market, such as multi-factor authentication, data loss prevention (DLP), encryption, zero trust, endpoint detection and response (EDR), XDR, data lock, data laundering, malware detection, email security gateway, device / port / interface control, UTM, backup / recovery, DLP, archiving, replacement scanning, TR-ESOR long-term archiving, labelling and APT defence, ISMS and SIEM, are versatile and almost unmanageable.
 
This lecture addresses which procedures are possible and sensible in the area of conflict between competing goals and limited budgets, which solutions and procedure models support technology, organisation and liability issues, and passes on decades of practical experience.
... read more

Language: German

Questions and Answers: No

Speaker

show more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.