This page is fully or partially automatically translated.

Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

action image header it logic
Forums it-sa Expo Knowledge Forum E

Tiger team or paper tiger: reducing damage instead of generating mountains of paper

Cybersecurity challenges are growing faster than budgets. What is the most efficient way to reduce damage?

calendar_today Tue, 22.10.2024, 11:00 - 11:15

event_available On site

place Hall 9, Booth 9-103

Action description

south_east

Themes

Awareness / Phishing / Fraud Data security / DLP / Know-how protection Legislation, standards, regulations Governance, Riskmanagement and Compliance

Event

This action is part of the event Forums it-sa Expo

Action description

While the number of hacker attacks on companies continues to increase, the pressure for more documentation and formalism through regulatory requirements such as NIS2 or DORA is increasing. A lack of skilled workers and stagnating budgets are forcing companies to focus and prioritize investments.

But how do you identify the biggest risks? How do you avoid blind spots when evaluating? What criteria do you use to prioritize the implementation of the measures? Does creating a policy reduce the risk of a hacker attack? Are compliance requirements and technical measures in conflict in the fight for scarce resources?

Peter Fischer's presentation shows a path from the identification and assessment of vulnerabilities to the creation of a prioritized roadmap in order to avert actual damage to the company as efficiently as possible.
... read more

Language: German

Questions and Answers: No

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.