This page is fully or partially automatically translated.

Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Header of IT-Power Services Deutschland GmbH
Forums it-sa Expo Knowledge Forum D

Why IT security should not end in the network area...

The IT infrastructure is the heart of your business processes and must be considered in the overall IT security strategy.

calendar_today Tue, 22.10.2024, 10:15 - 10:30

event_available On site

place Forum, Booth 7A-106

Action Video

south_east

Action description

south_east

Speaker

south_east

Themes

Awareness / Phishing / Fraud Data security / DLP / Know-how protection Governance, Riskmanagement and Compliance Identity and access management Managed Security Services / Hosting Network Security / Patch Management Data Center SIEM / Threat Analytics / SOC

Key Facts

  • IT infrastructure security (MFA, PAM, SIEM)
  • Security for IBM server and storage platforms
  • Strategic and organisational IT security consulting

Event

This action is part of the event Forums it-sa Expo

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

Dass Sicherheit in der Informationstechnik von mehreren Seiten aus betrachtet werden muss und nicht vorschnell auf die eine, enge Sicht technischer Verlässlichkeit eingeschränkt werden darf, sollte längst klar sein.

Oft wird IT-Security mit einem Fokus auf Netzwerk und Clients geplant. ABER die wichtigsten Informationen eines Unternehmens liegen auf der Kerninfrastruktur und es ist unerlässlich auch die Absicherung der Backend Systeme in der Gesamt Security Strategie sicherzustellen.
Auch für einen Worstcase, kompletter Verlust oder Zerstörung von Unternehmensdaten, gilt es Vorsorge zu treffen!
Mit Inkrafttreten von NIS-2 gilt es viele zusätzliche rechtliche Aspekte zu berücksichtigen.
... read more

Downloads

Language: German

Questions and Answers: No

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.