Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Header of Pathlock Deutschland GmbH
IT Security Talks Stream I

Cloud, AI, and SIEM: Why buzzwords alone are no guarantee for IT security.

Best practices for detecting and preventing threats.
From system hardening and authorization concepts to real-time protection.

calendar_today Wed, 12.06.2024, 10:45 - 11:15

event_available Digital

Action Video


Action description





Cloud Security Data security / DLP / Know-how protection Governance, Riskmanagement and Compliance SIEM / Threat Analytics / SOC

Key Facts

  • Cloud, AI and SIEM - big words, but no solutions.
  • Step-by-step guide to secure IT systems for NIS-2 & Co
  • Threat Intelligence as a game changer for your IT security



This action is part of the event IT Security Talks

Action Video

grafischer Background

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

We are asked one question time and again: "How do I make my ERP systems sufficiently secure to resist cyber attacks?". After all, with the NIS-2 directive on the horizon, there may be an unpleasant lesson to be learned in how often the most basic IT security homework has not been done.

The increasing professionalism and frequency of cyber attacks is no longer a surprising trend, and the majority of companies still see an urgent need for action. However, in our experience, companies often do not know how and where to start to address the challenges of increasingly complex IT landscapes – such as SAP, S/4HANA, Oracle or other ERP systems.

While NIS-2 finally provides clear guidelines for many companies, which first need to be implemented, they are already facing the next hurdle due to new technologies such as AI. So it's definitely time to raise one's defenses to a new level!

In this webinar, we will share our experiences and show you the most important steps to secure your IT landscape – from hardening your systems to authorization concepts and real-time security.

We are paying particular attention to our latest development, Threat Intelligence. The combination of established solutions such as Threat Detection, supplemented by automated processes, with customized responses tailored to the specific risk situation. With Threat Intelligence, access to critical applications can be restricted or blocked, data fields can be precisely masked, downloads can be prevented, or users with critical behavior can be locked out of the system. And all of this happens automatically and in real time, 24 hours a day. So you can remain calm even in the event of an attack.
... read more

Language: German

Questions and Answers: Yes


show more

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.