
Silently hacked: A disaster in five acts – and what you should learn from it
How technology, people, and organizations interact. Cybersecurity analysts are the human sensors for true security.
Topic
Education and trainingSIEM / Threat Analytics / SOCTrend topic
When & Where
Details
Format:
Lecture
Language:
German
Session description
Not a Hollywood hack show, but everyday madness: qSkills cybersecurity expert Björn Trappe shows how a company is infiltrated, spied on, and ultimately blackmailed within five days.
Experience how technical weaknesses, human routines, and organizational gaps interact perfectly for the attacker, while internally "business as usual" continues. For you, however, it's not just about the threat, but also about responsibility: With NIS2 and DORA, the demands are increasing not only on technology, but above all on operational responsiveness. You need someone who understands what's between the lines of a log file. Someone who recognizes patterns and assesses risks – before the damage is done.
This role exists: Cybersecurity Operations Analyst – the human ...
Experience how technical weaknesses, human routines, and organizational gaps interact perfectly for the attacker, while internally "business as usual" continues. For you, however, it's not just about the threat, but also about responsibility: With NIS2 and DORA, the demands are increasing not only on technology, but above all on operational responsiveness. You need someone who understands what's between the lines of a log file. Someone who recognizes patterns and assesses risks – before the damage is done.
This role exists: Cybersecurity Operations Analyst – the human ...
Sponsored by