
Cyber risk identified – now what? How to finally close security vulnerabilities
We show you how to maximize the resilience of your IT systems and effectively take your security strategy to the next level.
Topic
Data protection / GDPRLegislation, standards, regulationsIdentity and access management
When & Where
Details
Format:
Workshop
Session description
Don't just rely on security tools! We'll show you how to maximize the resilience of your IT systems and take your security strategy to the next level through system hardening, risk-based measures, and targeted knowledge building among your IT staff.
Register for the workshop here: https://aktionen.teal-consulting.de/it-sa-2025/
Risk-based approach, knowledge building, and reducing the attack surface:
Numerous companies rely on (M/X/E)DR solutions to protect their IT systems. These solutions promise to detect threats and respond to them before they can cause damage. Nevertheless, reported vulnerabilities must still be closed and attack surfaces consistently reduced, fo ...
Register for the workshop here: https://aktionen.teal-consulting.de/it-sa-2025/
Risk-based approach, knowledge building, and reducing the attack surface:
Numerous companies rely on (M/X/E)DR solutions to protect their IT systems. These solutions promise to detect threats and respond to them before they can cause damage. Nevertheless, reported vulnerabilities must still be closed and attack surfaces consistently reduced, fo ...