Cyber Security & Privacy
Cyber events can quickly destroy corporate assets and damage an organization's carefully built reputation. Attackers focus on large and small private companies as well as public sector organizations. Attacks take place randomly or specifically on selected companies and can remain undetected for a long time.
Is your Cyber Security up to date and do you (still) have your business data under control?
Today, information security is one of the central topics in the economy.
Cyber security is cited by many responsible persons as one of the major threats. The enactment of new regulations at the European and national levels has made it increasingly compulsory for companies to achieve adequate protection against cyber risks and for data protection. Otherwise, penalties of up to 4% of Group sales could be imposed.
Appropriate cyber security management includes both forward-looking risk considerations and the development of resilience in the event of an incident. We help you protect your business by identifying cyber threats and building appropriate cyber security management. We help you align your cyber security with your strategic business goals and achieve sustainable results from strategy to execution. To do this, we take a holistic approach to cyber security and adapt our measures to your industry and organization.
Resilience in the area of cyber security
"Resilience is a characteristic, more than a skill." says Dr. Thomas Rhomberg, Head of Security Operations & Transformation at SIX Group.
In specialist interviews, Dr. Rohmberg answers interesting questions about resilience from SIX Group's practical experience.
We support you in all aspects of the implementation of modern Cyber Security Management
- Information Security Strategy & Governance
- Data protection: Compliance with European, national and industry-specific regulations
- Information Security: ISMS
- security awareness
- Concept Cyber Defence Center and Security Operation Center
- Incident Management
- Business Continuity Management, IT Service Continuity Management
- Cloud security and compliance
- Security Architectures
- network security
- Identity & Access Management
- Security Officer as a Service
In our technical articles you will learn how we approach the topic of information security in concrete terms:
Security in the IoT - A topic on the move
In this publication, the first section highlights typical use cases of IoT. The second part then explains the most important points to consider for a secure use of the IoT.
Data Policy for EVUs
Read in our e-paper about the data management requirements of the utilities, their effects and what AWK Group has to offer accordingly.
Cyber-Resilience Study 2020: Ensuring the continued existence of companies
Study results 2020
The cyber resilience study by AWK Group and C-Level shows how companies from all economic sectors deal with cyber security.
Resilienz des Schweizer Finanzplatzes
AWK Focus (2019/10)
The buzzword "resilience" is omnipresent in the entrepreneurial context for one simple reason: the future is becoming increasingly difficult to predict in concrete terms. Resilience increases the resistance of companies to unknown and often negative events.