Forum Information Security

  • Implementation of the ISMS process based on ISO27001 and BSI basic protection
  • News on the protection of compliance requirements, especially protection of business secrets
  • Risk management, business continuity management and emergency concept
  • Head of Information Security reports from practice
  • Requirements for IT security officers and ISMS experts

Sponsor

Logo SIBB Sponsoren gesucht

Here could be your logo as a sponsor of the Information Security Forum.

Forum speakers

Josef Waclaw
CEO

Infotecs GmbH - Website

About:
LinkedIn

Expert
# Cyber security
# Intrusion detection and prevention
# IOT/IIOT protection 

Thorsten Vogel
Director  ICS Security Consulting, Phoenix Contact GmbH 

Phoenix Contact GmbH - Website

About:
LinkedIn, XING

Expert
# Industrial Cybersecurity
# Anomaly detection
# TÜV Rheinland Cybersecurity Trainings

Hans-Peter Möschle
Managing Director

M&H IT-Security GmbH - Website

Expert
# ISO 27001 and BSI basic protection
# Software-supported information classification
# Consultant and Trainer Information Security

Topics

Information security has undoubtedly become one of the central issues in the use of information and communication technology. Hackers are resorting to increasingly sophisticated methods that often deceive the user into believing that security is genuine. It is necessary to develop defence mechanisms that are easy to handle, offer a maximum of security and remain affordable. But it is not only technical solutions that provide more security. Information security takes place in many fields: It begins with raising awareness when handling data, continues with the coordination of the individual technical components and ends with the documentation of work processes - ultimately with an information security concept.

Added value of the events: important aspects in connection with information security, practical examples, exchange of opinions, latest topics, the findings of which are incorporated into the daily work with the customer.

Target groups:

  • Executives
  • IT security specialists