LEARN MORE ABOUT

EUROPE´S
LARGEST SOC

Europe’s largest Security Operations Center (SOC) is located in the Cybersecurity World in Vienna.

A SOC is comparable with a tower at an airport: Based on modern technology experts permanently monitor and evaluate the current IT security situation of companies and authorities and take immediate countermeasures in case of anomalies.

Based in Vienna highly specialized and continuously trained experts analyse the IT security of medium-sized and large enterprises with international operations and public institutions.

Per Year 514 petabyte of data on average is analysed, 61 trillion “events” are processed, 764 million of vulnerability information is evaluated and 2.4 million IT security incidents are identified.

DO THE

IT SECURITY HEALTH CHECK
FOR YOUR COMPANY

In the Cybersecurity World companies have the possibility to assess their status quo of their IT security based on a well-founded IT Security Health Check. Experts of RadarServices support in generating an objective picture of IT security and propose a cyber security strategy or a mix of emergency measures if needed.

Thereby the current strategy, the employed technologies, the processes, the personnel resources in the area of IT security and the general IT security culture of the company have to be taken into account.

LEARN MORE ABOUT THE

ENTIRE SPECTRUM
OF IT SECURITY TASKS

The diverse tasks of IT security at a glance – brief, concise and as a model for the right alignment of your IT security and your allocation of resources. In the Cybersecurity World you get an overview of everything that needs to be done.

The five areas Identify, Protect, Detect and React as well as Restore are explained in detail and bring structure into the variety of the tasks.

FOCUS CRITICAL INFRASTRUCTURES

WHEN IT SECURITY PROBLEMS
ARE INFLUENCING OUR DAILY LIFE

Critical infrastructures are an example for particularly interconnected, highly IT dependent and especially vulnerable areas of our daily life. IT security problems have immediate effects on large parts of our population.
In 2016 ransomware paralyzed numerous hospitals in Germany and other countries worldwide. Operations had to be postponed, patients needed to be transferred to other clinics. The affected hospitals were only working in “manual operation” mode for days. This is only one of many examples for critical infrastructures that require utmost protection. Among others banks, airports, the police and fire department, gas, water and electricity providers are examined closely in the Cybersecurity World with regards to their IT systems and respective security.

LERAN MORE ABOUT THE

PRESENTATION OF
REAL CYBER ATTACKS

Experts are presenting cyber attacks – not by textbook – but based on real events. How does an attacker get access to strictly confidential developer data of an internationally active corporation? This cyber attack with five months of preparation and implementation time is closely examined in all its facets. How could have the corporation detected this attack and could have prevented it? Also this position is explained in detail by experts.

INSIGHTS INTO THE

DEVELOPMENT OF
NEW IT SECURITY TECHNOLOGIES

The agile software development and extensive processes of constant quality assurance are essential aspects in the development and advancement of new IT security technology. Experts explain how new software features and changes are created in structured processes: feasibility analyses as well as goal-specific implementation, numerous runs on the version systems and extensive test runs until a final approval and acceptance test accompanied by product management.

TAKE A LOOK WITH US IN THE

FUTURE OF IT SECURITY

How secure is the IT of tomorrow? How are cyber attacks developed and what have IT security technologies be capable of in order to protect the tomorrow’s IT? It’s all about artificial intelligence, the self-defence of systems and the automatized attack detection. What all this means, how it works and how the status quo of the research in IT security technology is, will be elaborated by the experts in the Cybersecurity World.