Users of the SWIFT network are required to demonstrate compliance with the mandatory security controls through an annual independent audit in...
Security Audits
KRITIS: These Sectors Are Required to Provide Proof of Compliance in 2025
According to Section 8a (1) BSIG, operators of critical infrastructures (KRITIS) in Germany are obliged to take appropriate organizational and...
Information Security in Third-Party Risk Management: How to Monitor Your TPRM Program
Companies often work with a large number of service providers in order to be able to concentrate on their core business or save costs. For this to...
NIS-2: The Most Important Takeaways from the German Implementation Act
The law implementing the NIS-2 Directive aims to transpose the requirements of the European NIS-2 Directive into the German legal system. On May 7,...
What Does “Periodically” Actually Mean? PCI DSS v4.0 Specifies Timeframes
“Promptly”, “quarterly”, “periodically”: Many PCI DSS requirements demand that measures be implemented within a specified timeframe. While version...
PCI DSS v4.0: The Transition Phase Is Over. What Will Change for You?
On March 31, 2024, the previous version 3.2.1 of the Payment Card Industry Data Security Standard (PCI DSS) expired. While companies were able to...
NIS-2 - Three Questions for our Experts on the New EU Directive
NIS-2: The new EU directive for cyber security is currently raising questions for security managers in countless companies: Are we affected? What...
What Cyber Security Has to Do with Your Annual Financial Statements
Inadequate cyber security is one of the biggest risks for companies today. This is the assessment of the World Economic Forum, which ranks cyber...
Secure or Not Secure, That Is the Question: “Cyber Security Assessments in Practice” at TU Munich
What are the different types of cyber security assessments? Why do companies undergo such security assessments? And how exactly does it work? Nico...
Information Security in Third Party Risk Management: The Basics
Companies often work with a large number of service providers in order to be able to concentrate on their core business or save costs. For this to...
Ready for NIS 2? Be the Early Bird!
How to prepare your company for the implementation of the Directive in good time When it comes to implementing the NIS 2 Directive, our experts'...
SWIFT Expert Tip: Combine Your Current SWIFT Assessment with a Gap-Analysis for CSCFv2024
SWIFT users are required by the Customer Security Controls Framework (CSCF) to demonstrate compliance with at least all mandatory controls through...