
Tiger team or paper tiger: reducing damage instead of generating mountains of paper
Cybersecurity challenges are growing faster than budgets. What is the most efficient way to reduce damage?
Topic
Awareness / Phishing / FraudData security / DLP / Know-how protectionLegislation, standards, regulationsGovernance, Riskmanagement and Compliance
When & Where
Details
Format:
Technology lecture
Session description
While the number of hacker attacks on companies continues to increase, the pressure for more documentation and formalism through regulatory requirements such as NIS2 or DORA is increasing. A lack of skilled workers and stagnating budgets are forcing companies to focus and prioritize investments.
But how do you identify the biggest risks? How do you avoid blind spots when evaluating? What criteria do you use to prioritize the implementation of the measures? Does creating a policy reduce the risk of a hacker attack? Are compliance requirements and technical measures in conflict in the fight for scarce resources?
Peter Fischer's presentation shows a path from the identification and assessment of vulnerabilities to the creation of a prioritized roadmap in order to ...
But how do you identify the biggest risks? How do you avoid blind spots when evaluating? What criteria do you use to prioritize the implementation of the measures? Does creating a policy reduce the risk of a hacker attack? Are compliance requirements and technical measures in conflict in the fight for scarce resources?
Peter Fischer's presentation shows a path from the identification and assessment of vulnerabilities to the creation of a prioritized roadmap in order to ...