This page is fully or partially automatically translated.

Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Action of the IT Security Talks
IT Security Talks Stream I

Maximizing Cyber Defense with Attack Surface Management

Identify innovative strategies to manage external attack surfaces and strengthen your organisation's security against cyber threats.

calendar_today Tue, 11.06.2024, 10:45 - 11:15

event_available Digital

Action Video


Action description





Awareness / Phishing / Fraud Cloud Security Endpoint Protection Governance, Riskmanagement and Compliance Network Security / Patch Management

Key Facts

  • Attack Surface Management
  • Threat Intelligence



This action is part of the event IT Security Talks

Action Video

grafischer Background

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

In this session discover innovative strategies on managing external attack surfaces and fortifying your organization's security against rapidly evolving cyber threats.
Explore the practical approaches to uncover and manage exposed assets across cloud and IoT environments.

Learn to optimize processes, manage false positives effectively, and swiftly identify asset owners for better risk remediation.
Gain insights on developing integration strategies to enhance the effectiveness of your security frameworks, ensuring a proactive stance against potential breaches and minimizing response times to critical threats.

... read more

Language: German

Questions and Answers: Yes


show more

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.