5.5.2020 PodiumsdiskussionRead More
This enables the definition and introduction of customized and individual security solutions
The method of the training, will be a real-life strategic simulation exercise, based on a specific and custom made scenario. The scenario is built to include escalating ripple effects, which are designed to raise crucial questions with regard to cyber risks in a company and force management to take decisions and implement measures under time pressure to avoid a company wide crisis. The simulation exercise is highly interactive and engages all participants actively. It is designed to push the participants to take important strategic and operational decisions. The scenario is tailored to fit the specific roles and duties of managers. Customer-specific wishes can be considered at any time. At the end of the seminar you will be able to assess the overall threat situation, (see Geopolitical Cyber Assessment), company relevant vulnerabilities and judge which strategic, organizational, personal and physical measures are needed to handle a cyber attack with as little as possible collateral damage and long term implications. You will also understand and know what is needed to develop and implement a cyber strategy for your company. The importance at this point is not to understand the technical complexity, but rather the entire process behind the attack and the modus operandi of the attackers. It is also important to know which methods are used to limit damage incurred and know who can help in which situation. Often it is the case that the victim does not only not know how to handle the crisis, but he also does not know who to turn to for help (see Cyber Coordination and Emergency Centre, CCEC).
It is imperative for every company to know what the global environment is and what its position is to assess who the enemy could be. In short, who you are, will determine who your enemy is. In order to know who you are, you need to know what the overall geostrategic picture is, assess the company, its market position and customers, its products and suppliers, innovations and what competitive advantage arises from them. It is also vital to understand the difference between the so called mass phenomena, such as (Ransomware and DDoS attacks), which are financially motivated and the individual phenomena (Advanced Persistent Threats), which are politically, economically, militarily motivated and evaluate which of the two could affect your company and why. read more
Cyber security is also a challenge for technology companies. Complex customer architectures, new laws and regulations and the ever increasing sophistication and professionalization of Cyber criminals, who constantly find new means and ways to attack Government structures, critical infrastructures and companies mean that IT providers have to stay on top of the game and face new tasks and obligations. IT providers have to ask themselves basic questions with regard to their products, services and customer environment and whether they are in need of adjustment to fit the new Cyber challenge. The questions can only be answered, if Cyber security is a intrinsic part oft he Company structure. read more
soon more infos
Die Cookie-Einstellungen auf dieser Website sind auf "Cookies zulassen" eingestellt, um das beste Surferlebnis zu ermöglichen. Wenn Sie diese Website ohne Änderung der Cookie-Einstellungen verwendent oder auf "Akzeptieren" klicken, erklären Sie sich damit einverstanden.