The challenge: IT security in complex systems
 
Does your system consist of different components, from embedded systems to mobile applications and cloud applications, which require IT security expertise in different areas?
 
Are you looking for expertise in all sub-areas for a comprehensive situation assessment?
 
The solution: security concept analysis and evaluation
 
The workshop addresses individual companies and allows to discuss a specific or upcoming product, concept or service with an individual selection of IT security experts in all relevant sub-areas to get an external expert view. You receive immediate recommendations that you can take into implementation.
 
 It also identifies aspects that need to be analyzed more deeply to meet the desired requirements. To ensure open communication and exchange, a non-disclosure agreement (NDA) is recommended
 
 
 
Your advantages at a glance
 
After the workshop you can...
 
 
 - implement concrete recommendations for the security of your products immediately
  
 - assess which areas of your system need a deeper analysis
  
 - precisely plan the next steps to improve your information security
  
 
This workshop offers you...
 
 
 - an intensive exchange with IT security experts for embedded, networked systems, mobile applications up to cloud applications
  
 - a sound assessment of the security of your systems, products or services