Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Header of ibi systems GmbH
Forums it-sa Expo Knowledge Forum F

Information Security beyond Compliance

Learn more about how information security can be implemented with software support and beyond the fulfillment of compliance requirements.

calendar_today Thu, 24.10.2024, 10:45 - 11:00

event_available On site

place Forum, Booth 9-443

Action Video

south_east

Action description

south_east

Speaker

south_east

Themes

Legislation, standards, regulations Governance, Riskmanagement and Compliance

Key Facts

  • Implementation of the group-wide information security
  • Checking and ensuring compliance requirements
  • Semi-automated risk and measure management

Event

This action is part of the event Forums it-sa Expo

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

Without question, compliance requirements must be adhered to, and in some cases, there are even severe penalties for violating them (e.g. GDPR, DORA, NIS2). However, what all these regulations have in common is that they only formulate generic requirements and often remain vague in their implementation instructions. Industry-specific standards such as ISO/IEC 27019 (information security measures for energy utility industry) and DORA (digital operational resilience in the financial sector) or initiatives from mergers of companies in the same industry provide an initial improvement to this problem. Even if the requirements are adapted as closely as possible to the industry, compliance standards only address the absolutely necessary measures and controls. The identification and risk assessment of the individual threat situation and vulnerabilities of an organization as well as the definition of appropriate countermeasures always remains the task of the CISO. The ibi systems iris software from the manufacturer ibi systems supports the CISO in the necessary adherence to compliance, the risk assessment of the individual threat situation and the definition and tracking of measures.

In the first part of the presentation, we will use concrete examples to explain how to check the adherence of internal or external requirements using ibi systems iris in your company and at your suppliers.

In the second part, we show how individual risk assessments can be created and maintained and how countermeasures from these and from compliance checks can be managed and tracked.

You can see the results of your information security activities with just one click using the various customizable dashboards available in the software. This enables you as CISO to provide a statement on the status of information security at any time.

We look forward to welcoming you in person at it-sa 2024 at our presentation in the Forum 9-F and at our booth 9-341a in hall 9.
... read more

Downloads

Language: German

Questions and Answers: No

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.