This website uses cookies to make the content more user-friendly and effective. By using this website, you agree to the use of cookies. You can find additonal information about the use of cookies and the possibility of objecting to the use of cookies here.

Use #itsa19

6 - 8 October 2020 // Nuremberg

Posting print layout

What information should be shown in the print layout?

Create print layout
Exhibitors & Products it-sa 2019
Zoom product LOGO_Cyber Threat Management

Cyber Threat Management

LOGO_Cyber Threat Management

Cyber Threat Management

Request information Request information

Contact us

Please enter your personal information and desired appointment. You can also leave us a message.

Your personal information

Your message for us

Desired appointment during the exhibition

* Compulsory fields you must fill in.

Information on data protection can be found here.

Send
Your message has been sent.

You do not have a registration yet? Register now and use all advantages of the Exhibitors and Products Database, the supporting programme and the TicketShop.

An error has occurred.

Cyber threats are all around us and are continually evolving – and your cyber defense systems need to reflect this.

In an increasingly digitalized world, cyber threats are not just limited to conventional IT and a few typical attack paths such as email and web servers, they affect all aspects of digital value creation processes (e.g., digital payment transfer), development and production of conventional and digitalized products (trade secrets) and also connected products (such as connected vehicles and smart home products). 

Legislation is also evolving as these threats grow. Many countries have enacted personal data privacy laws similar to the EU’s General Data Protection Regulation. Non-personal data is protected by laws such as the German Trade Secrets Act and the IT Security Act.

We can help you to align the security level in your organization technically with your business strategy, risk appetite and legal requirements as well as to achieve a consistent and homogeneous design and maintain this security level over the long term.

Our multidisciplinary teams offer you comprehensive support and managed services for the prevent, detect, respond and recover functions, including:

  • Security in application development
  • Network, website and mobile app vulnerability scanning and penetration testing
  • Red and purple teaming
  • SOC/SIEM scenario definitions, establishment, optimization, performance analysis, operation
  • Ad hoc or ongoing threat intelligence
  • Emergency drills, crisis management exercises
  • Incident response induction, training, “rapid reaction force”
  • Business continuity/disaster recovery plan, support for implementation, exercises

Boasting more than 7,000 cybersecurity professionals around the world, EY can advise and support you on all aspects of cybersecurity and related areas, such as the interface to corporate risk management, data protection, identity management, cybersecurity in the industrial environment or information security management in general.

EY Cybersecurity: cybersecurity@de.ey.com

You decided to attend the it-sa? Get your tickets at the TicketShop



top

The selected entry has been placed in your favourites!

If you register you can save your favourites permanently and access all entries even when underway – via laptop or tablet.

You can register an account here to save your settings in the Exhibitors and Products Database and as well as in the Supporting Programme.The registration is not for the TicketShop and ExhibitorShop.

Register now

Your advantages at a glance:

  • Advantage Save your favourites permanently. Use the instant access – mobile too, anytime and anywhere – incl. memo function.
  • Advantage The optional newsletter gives you regular up-to-date information about new exhibitors and products – matched to your interests.
  • Advantage Call up your favourites mobile too! Simply log in and access them at anytime.