The challenge: IT security in complex systems
Does your system consist of different components, from embedded systems to mobile applications and cloud applications, which require IT security expertise in different areas?
Are you looking for expertise in all sub-areas for a comprehensive situation assessment?
The solution: security concept analysis and evaluation
The workshop addresses individual companies and allows to discuss a specific or upcoming product, concept or service with an individual selection of IT security experts in all relevant sub-areas to get an external expert view. You receive immediate recommendations that you can take into implementation.
It also identifies aspects that need to be analyzed more deeply to meet the desired requirements. To ensure open communication and exchange, a non-disclosure agreement (NDA) is recommended
Your advantages at a glance
After the workshop you can...
- implement concrete recommendations for the security of your products immediately
- assess which areas of your system need a deeper analysis
- precisely plan the next steps to improve your information security
This workshop offers you...
- an intensive exchange with IT security experts for embedded, networked systems, mobile applications up to cloud applications
- a sound assessment of the security of your systems, products or services