5
5
Service

Media

Media

Webinar: Werthaltiges Risikomanagment – Von der lästigen Pflichtaufgabe zum echten Mehrwert

Almost daily, the media report on successful cyber attacks or accidental data loss. Against the backdrop of an ever-increasing complexity, the question arises whether we are dealing with the right issues when it comes to cyber security. A sensible risk analysis should remedy this and is indeed already required by law for many sectors. Often, however, only a very superficial look is taken at abstract risks or one gets lost in endless, useless Excel lines. But what if the mandatory task of risk management delivered real added value from which the company can continuously benefit in its day-to-day operations and in its digitalisation projects? This webinar provides answers to questions such as what is risk management actually for, what added value does it provide for companies and how can you operate your ISMS efficiently with TTS trax.

Watch the webinar (German)

 

Webinar: Informationssicherheit im Krankenhaus: Wie auf die neue Bedrohungslage reagieren

Toward the end of 2020 the already worrying threat situation due to targeted cyber attacks, blackmail attempts and sabotage on German hospitals has once again significantly worsened. What are the implications for the security of information processing (availability, confidentiality, integrity, authenticity) and, subsequently, patient safety? How can we tackle the task of bundling the available resources in the best possible way and how can we develop systematic solution strategies? How can this be implemented as effectively as possible in practice?

We will address these questions in the webinar using selected practical examples.

  • The threat situation is coming to a head. Despite the considerable efforts by hospitals, the protection goals of availability, confidentiality, integrity, authenticity and, as a result, patient safety are under threat.
  • Information security is not just an IT issue, but requires systematic management throughout the entire organisation.
  • The subject is too complex for blanket solutions. A targeted approach is imperative which, in turn, requires systematic risk management.
  • What can something like this look like in practice?

Thanks to our many years of experience working with numerous companies from various sectors, we have a broad pool of situation-dependent best-practice approaches regarding ISMS implementations and systematic risk management.

Watch the webinar (German)

 

Webinar: KRITIS sicher mit einem ISMS Tool betreiben

KRITIS operators are nowadays confronted with an intensified cybersecurity threat situation at the same time that regulatory requirements are constantly increasing. The complexity of risk management and evidence management is almost impossible to manage with traditional tools. But how about having an intuitive tool that also offers the most flexible configuration possible with regard to KRITIS requirements?

Watch the Webinar (German)

Weconference "Security Pflichten gezielt erfüllen"

KRITIS operators are nowadays confronted with an intensified cybersecurity threat situation at the same time that regulatory requirements are constantly increasing. The complexity of risk management and evidence management is almost impossible to manage with traditional tools. But how about having an intuitive tool that also offers the most flexible configuration possible with regard to KRITIS requirements?

Watch the Webinar (German)

Webinar: Wie ein ISMS-Tool bei der Umsetzung eines B3S-Krankenhauses unterstützt

Krankenhäuser werden heutzutage mit einer verschärften Bedrohungslage bei der Cybersicherheit konfrontiert, gleichzeitig nehmen die gesetzlichen Anforderungen stetig zu. Mit dem neuen § 75c des SGB V sind auch kleinere Häuser dazu verpflichtet den B3S umzusetzen.

TTS trax nimmt Sie beim Einstieg in das Informationssicherheitsmanagement an die Hand und unterstützt Sie auch weiterführend im laufenden Betrieb. Im Webinar zeigen wir Ihnen, wie das funktioniert.

Jetzt Webinar ansehen

trax News

trax News

Unser TTS trax Entwicklungsteam hat sich in den letzten Wochen nochmal intensiv in das bevorstehende Release reingehängt, sodass wir nun die neue TTS trax Version 4.0 präsentieren können.

more information

Am 18.05.2022 fand das dritte TTS trax Anwenderforum statt. Mit 32 Anwendern unseres ISMS Tools TTS trax diskutierten wir über die neuen Funktionen, geplante Entwicklungen und Wünschen für die Zukunft.

more information

On 08 December 2021, our TTS trax release v3.2.0 was virtually presented including all its new and optimised features. On this occasion, we were pleased to welcome 40 users and administrators, who learned how they will benefit from the new functional features and how TTS can support them.

more information

Heute wurde das TTS trax Release 3.2.0 veröffentlicht. Viele neue Funktionen und Verbesserungen wurden implementiert.

more information

Am 22.10. findet stellen wir unser Tool auf der Webkonferenz "KRITIS Security Pflichten gezielt erfüllen" vor.

more information

The second virtual TTS trax user forum took place on 20.05.2021. With 27 users of our ISMS tool TTS trax, we discussed the new functional enhancements, planned developments and customer requirements for the future.

more information

„TTS trax - The smart tool for an efficient ISMS.“

This has now been put to the test in an extensive review by KonBriefing Research. Read how trax was able to convince in every respect.

more information

Today, release version 3.0 of TTS trax was published, which enhances TTS trax by a Business Continuity Management module. The new module supports TTS trax by analysing the impact of emergency scenarios on business processes. The aim here is the development of a planned and organised approach to emergencies, which ensures the continuity of business operations.

more information

On 18 February, TTS in cooperation with Datakontext organised a webinar on the topic of "Information Security in Hospitals: How to Respond to the New Threat Situation."

 

more information

When it comes to risk management, operators of critical infrastructures often either lose themselves in endless Excel lines, or they only analyse risks in a very abstract way and limit themselves to a compliance-focused implementation of a few minimum security measures.

 

more information