Newsflash: +++ Hackers Stole Over 6.42 Million SHEIN Customers' Data +++ SAP Customer British Airways hacked: Hackers steal financial data in BA website attack +++ The same hacker group who breached Ticketmasters were behind the British Airways attack, using DIGITAL SKIMMING +++

Milky Blog

know what’s going on out there about SAP®

  • Blog
  • Read Our Rules

agileSI joins SecureLink Security BootCamp R'Dam

By Hendrik Jansen  - March 16, 2018

Cyber Security is gaining visibility and attention all over the world, in almost every newspaper, article or news-site you can read about D-DOS attacks, vulnerabilities, exploits, ransomware, and crypto jacking. No wonder that the Security BootCamp in Rotterdam attracted more than a 1,000 professionals in the Cyber or IT or OT security domain.

Over the course of the 2-day event in Rotterdam (very well organized we may add), we spoke to hundreds of IT professionals, security architects, CISO’s, DPO’s and CIO’s who all shared their overall concerns with us.

The top 3 concerns or point of views that we took back from the event are:

  1. 100% prevention simply does not work, Cyber Security or I(O)T Security is cat and mouse game. The defender prevents something, the attacker finds a new way, it is the nature of the game...
  2. That is the reason that DETECTION is becoming more and more important. Simply look at the adoption rates of SIEM systems and you can see exactly that trend
  3. The entire market is very much engaged with the bottom-up level of prevention & monitoring

BootCamp.jpgThink about all the different solutions and vendors in the area of network, traffic, ports, virus, email, endpoints... But who is looking after your CROWN JEWELS? Great question!

Who is providing transparency, insight, and detection of your business application systems that run your entire company? Another great question

The market is maturing rapidly and organizations and security professionals start to realize that perhaps protecting your most precious (but very often still vulnerable) ERP system could be a smart idea.

It is not only the external threat you need to be aware of, research is showing that roughly 60% of exploits and threats are really caused by internal factors, lack of process, lack of discipline, lack of configuration, or simply the fact that people do make mistakes and forget things.

To the many visitors on our agileSI™  booth, we thank you for all the talks, the interest in ERP Security and the exchange of ideas. Talk to you soon, and see you next year !!!


Enroll and receive updates!

Popular posts

We take privacy seriously! This is what happens to your data:

  • Data from forms and website-tracking can be saved for analysis.
  • Data can be evaluated for optimizing the website. This enables us to better understand what our visitors are interested in. We primarily use Hubspot for this tracking. You can find more information on this in our privacy policy linked at the bottom.
  • We do not share your data with third parties. In the context of events in which you want to participate it might be necessary to submit your data to contractors.
  • You have the right to have your personal data corrected, deleted or transfered to you at any time.
  • You can withdraw your consent to any sort of communication with us at any time.

More details about what we do and don't do with your personal data can be found in our privacy policy, or you can directly contact me by e-mail!

Felix Möckel
Data Protection Officer