default Stage Background

Tiger team or paper tiger: reducing damage instead of generating mountains of paper

Cybersecurity challenges are growing faster than budgets. What is the most efficient way to reduce damage?

Topic

Awareness / Phishing / FraudData security / DLP / Know-how protectionLegislation, standards, regulationsGovernance, Riskmanagement and Compliance

When & Where

calendar_month

Tue, 10/22/2024, 11:00 - 11:15

location_on

Forum, Booth 9-103

Download session as iCaldownload_for_offline

Details

  • Format:

    Technology lecture

Session description

While the number of hacker attacks on companies continues to increase, the pressure for more documentation and formalism through regulatory requirements such as NIS2 or DORA is increasing. A lack of skilled workers and stagnating budgets are forcing companies to focus and prioritize investments.

But how do you identify the biggest risks? How do you avoid blind spots when evaluating? What criteria do you use to prioritize the implementation of the measures? Does creating a policy reduce the risk of a hacker attack? Are compliance requirements and technical measures in conflict in the fight for scarce resources?

Peter Fischer's presentation shows a path from the identification and assessment of vulnerabilities to the creation of a prioritized roadmap in order to ...

Speaker

Moderator