Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Header of secunet Security Networks AG
Forums it-sa Expo Knowledge Forum E

Security, compliance, regulation: no budget, no staff, high complexity

NIS 2 Directive, Cyber Resilience Act and Co.: What impact do the regulations have on the technical setup and compliance?

calendar_today Tue, 22.10.2024, 16:00 - 16:15

event_available On site

place Forum, Booth 9-103

Action description

south_east

Speaker

south_east

Themes

Data security / DLP / Know-how protection Endpoint Protection Legislation, standards, regulations Identity and access management Industry 4.0 / IoT / Edge Computing Network Security / Patch Management SIEM / Threat Analytics / SOC Trend topic

Key Facts

  • Understanding and implementing NIS-2#More resilience and business continuity with cybersecurity#Mastering new compliance requirements

Event

This action is part of the event Forums it-sa Expo

Action description

Right on time for it-sa: the EU member states must adopt the NIS 2 Directive into national law. The aim is to protect economically important companies and critical facilities from cyber attacks. The Cyber Resilience Act (CRA) also addresses greater security for end consumers and companies with a focus on connected products. But what specific impact will the new regulations have on companies and their day-to-day work? What compliance requirements result from this? And which technical setup is better: as-a-service applications or on-premises?
In addition to the theoretical perspective on all these topics, the presentation will provide a practical look at a cyber attack on a wind power plant. Step by step, we will show how the attack is detected, stopped, reported and remotely controlled in accordance with BSI requirements and how security vulnerabilities are eliminated. The combination of a secure edge computing application, an attack detection system, a private key infrastructure (PKI) and a secure communication tool makes this possible.
In addition to the presentation, there will be a live demonstration of the attack scenario at secunet stand 411 in hall 9.
... read more

Language: German

Questions and Answers: No

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.