Endpoint Cybersecurity GmbH
- Introduction to CISA’s Secure by Design Initiative
- Implementing ISO 27001:2022 Annex A.18 – Compliance
- Maping NIS2 requirements to the ISO 27001:2022 framework
- Implementing ISO 27001:2022 Annex A.17 – Information Security Aspects of Business Continuity Management
- Implementing ISO 27001:2022 Annex A.16 – Information Security Incident Management
- Executive summary: NIS2 Directive for the EU members (updated)
- NIS-2: 10 common misconceptions about the regulation
- Implementing ISO 27001:2022 Annex A.15 – Supplier Relationships
- Understanding ISO 27001:2022 Annex A.14 – System Acquisition, Development, and Maintenance
- Understanding ISO 27001:2022 Annex A.13 – Communications Security
Attending Virus Bulletin Conference in Prague
/in PostI will be representing my company Endpoint Cybersecurity GmbH in attending the Virus Bulletin Conference in Prague between 27.9 and 1.10. If you want an appointment, please Contact Us.
One year later: challenges for young anti-malware products today (presentation Virus Bulletin 2020)
/in PostDownloads Download slides (PDF) A year ago, at VB2019 we presented for the first time an overview of how the anti-malware world looks from the perspective of a young company trying to enter the market: how they try to build products, how they try to enter the market, how they try to convert users, […]
Challenges for young anti-malware products today (presentation Virus Bulletin 2019)
/in Posthttps://www.virusbulletin.com/conference/vb2019/abstracts/challenges-young-anti-malware-products-today Sorin Mustaca (Sorin Mustaca IT Security Consulting) Download the slides: https://www.virusbulletin.com/uploads/pdf/conference_slides/2019/VB2019-Mustaca.pdf There are two categories of anti-malware vendors: Established anti-malware vendors, who are preoccupied with getting the best scores in detection tests and capturing more market share. Emerging anti-malware vendors, who are trying to understand what they need to do in order to enter the […]
Participant in the Cyber Security Alliance
/in PostA movie describing what this is: https://www.allianz-fuer-cybersicherheit.de/ACS/DE/Ueber_uns/ueber_uns.html