Improve Security With Critical Infrastructures Requirements

In order to watch this video, you have to log in or create an account, if you don't have one yet.
By continuing, you agree that the speakers of this event will have access to the video statistics.


Organizations or institutions that are essential for the public are called Critical Infrastructures (KRITIS = “Kritische Infrastrukturen”). As such, they are subject to comprehensive and strict legal regimes consisting of laws and regulations. Their failure or significant impairments result in sustained supply shortages, significant disruptions to public safety or other drastic consequences. Their protection and the safeguarding of the public require appropriate concepts, processes and technologies.

Watch this webcast and learn how your organization can benefit from critical infrastructure requirements:

  • Achieve better understanding about threats to your organization
  • Enhance your security capabilities to meet the security requirements of the growing IT landscape based on standardized requirements instead of self-defined isolated solutions
  • Know how to protect relevant business functionalities
  • Limit security outages and prepare for business continuity

KuppingerCole Senior Analyst Matthias Reinwarth and Lead Analyst Christopher Schütze explain how KRITIS regulations and the associated requirements can be strategically addressed and how these directives can enhance corporate security and resilience beyond actual operators of critical infrastructures.

Language: English • Duration: 40:09 • Resolution: 1280x720

Learn more about this webinar

Latest Related Videos

More Related Videos


KuppingerCole PLUS

Get access to the whole body of KC PLUS research including Leadership Compass documents for only €800 a year

Stay Connected

KuppingerCole on social media

Next Webinar

Webinar

Sicherheit für SAP und mehr: Wie IGA-Systeme unterstützen können

Access Governance-Tools sind in der heutigen Business-IT ein unverzichtbares Element. Sie dienen dem Management von Benutzer- und Berechtigungsworkflows, der Vergabe von Zugangsrechten, der Durchführung von Kampagnen zur Zugriffszertifizierung und der Implementierung und Prüfung von Controls für die Funktionstrennung (SOD). Mit einer wachsenden Zahl von Business-Applikationen, gerade auch aus der Cloud, und ihrer Vernetzung wächst die Herausforderung, Access Governance übergreifend und automatisiert umzusetzen.

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00