IT security
14DORA: How cyber security works in the financial sector
Cybersecurity is everyone's business, especially in the financial markets. The European Commission has now introduced a comprehensive security framework for these with the DORA Regulation (Digital Operational Resilience Act). This article shows what DORA means and how companies can prepare for it.
Achieving corporate objectives with IT governance
We face numerous challenges in the corporate world. With advanced digitalization and the importance of the technology environment, success depends heavily on the role of IT. Governance, or oversight, is needed to ensure that IT initiatives strategically align with corporate objectives. This article explains IT governance and discusses how it can be achieved.
Incident Response Plan (IR Plan) – Creation & Template
Don't have an incident response plan yet? You are not alone in this. Many companies do not have fixed procedures for responding to incidents.
In our digitalized working environment, it is crucial to know how to prepare for potential threats and respond to incidents. It is important to protect business processes. In the worst-case scenario, negligence in this area can cripple the entire value chain or lead to severe penalties.
How to Ensure Reliable Protection for Critical Infrastructure
The critical infrastructure is in the spotlight – among security teams and politically. It must be protected from threats so that it is always available to people. This article looks at how this can be achieved.
Incident Response – Definition, Goals and Best Practices
Responding to incidents is crucial for companies - especially those who are considered part of the critical infrastructure (KRITIS). Sometimes it’s even essential for survival. Incidents may be disruptions to business operations or situations that affect the relationship with the customer, for example.
Incident Management – Meaning, Objectives and Process
Effective incident management is a key prerequisite for smooth and secure company or organization operation. The following provides a detailed overview of the importance, objectives, roles and processes related to incident management.
ISO 27001 Certification
ISO 27001 certification signifies that a company or organization has established an ISMS that is in line with the international standard. Learn what you need to look out for and how to find the right ISMS solution to support certification efforts.
Five-step Plan for IT Security in Manufacturing
A step-by-step plan helps increase IT security in production. More than half of companies are not ideally prepared for an IT security incident.
About the right cyber security tool
Finding the right cyber security tool is not always easy. We have prepared a selection of tools and explain the differences.
Cyber security and Cyberattacks: Investments that pay off
The digitization of business is picking up speed. Find out why cyber security should not be neglected here.
Taking a Look at 2021
What trends will shape your IT organization or business in the upcoming year? Christopher Kuhn, COO OTRS Group, gives an outlook.
Security Incident Management Process – Planning and Implementation
How does an incident management process work? What has to be considered in case of an incident? And how can STORM help?