Augsburg/Germany, 1 August 2007
In these times of globalisation and intense competition, some companies systematically spy on their competitors. To do so, they use the widest variety of methods – often in a very skilful way without leaving any evidence behind. In his keynote speech, Hans-Jürgen Stenger, Head of the Forensic Information and Communications division of Bavaria’s Office of Criminal Investigation (LKA) will reveal the current potential threat which companies face. The „Anatomy of an Industrial Espionage Attack“ will also be presented in a keynote speech at the event roadshow using live demonstrations and short video clips. In four such keynote speeches at three different German venues, namely Hanau (06.09.), Düsseldorf (13.09.) and Munich (25.09.), experts will be raising awareness about defence against „corporate information thieves“.
A lot of companies in Germany have still not developed any awareness of the topic of industrial espionage. Modern industrial spies eavesdrop on telephone conversations, intercept emails and infiltrate other companies‘ computer systems – in most cases without leaving any evidence behind. However, the fact that industrial and competitive espionage is not a trifling matter is underlined once again by the current case between two rival IT companies. In Germany alone, the damage to the economy resulting from industrial espionage is estimated to amount to at least 8 thousand million euros a year. The new dimension added to computer crime and criminality via the world-wide networks shows not only how vulnerable today’s „information society“ is to criminal attack but also how unprepared it is in matters of criminal prosecution and the taking of evidence as required for such.
High threat potential – victims are taken by surprise
In his keynote speech, Hans-Jürgen Stenger, who has been the head of the Forensic Information and Communications division of Bavaria’s Office of Criminal Investigation (LKA) since 1999, reveals the current potential threat which companies face: Statements such as „I was completely taken by surprise by the attack on our internet portal“ or „I would never have thought it of my employee“ document the fact that victims are completely unprepared for the situation in which they find themselves. There are several aspects which not even good crisis management can rectify after the attack has occurred. The focus of computer forensics is on the securing and recovery of data, the research and analysis of evidence which is primarily in digital form and the documentation of this evidence in a manner which will stand up in court.
Anatomy of an industrial espionage attack
Michael Hochenrieder, Managing Director of HvS-Consulting, and his colleague Andreas Schnitzer use live demonstrations and short video clips to show how spies gain access to critical corporate information. They demonstrate how an attack is typically carried out and how offenders use weaknesses in the company’s IT infrastructure to perform their hacking and social engineering attacks on employees. In conclusion, they present ways in which companies can protect themselves from such attacks.
The event proves: IT security is an interdisciplinary task
Companies are increasingly realising that IT security is an interdisciplinary task which must be perceived and attended to by all corporate divisions. The requirements arising from the grown infrastructures alone are of a demanding nature. A significant proportion of managing directors and employees is connected to or has mobile access to the back-end systems. This event roadshow intends to show that it not just a question of continuing on with previous strategies but instead of rethinking and redefining the topic for the purpose of looking at it in a legally compliant, pro-active and all-encompassing manner. This challenge which IT managers face is the topic of the IT-BUSINESS Academy’s 6th event roadshow.
More information about the »IT Security Partner Solution Days & IT Decision-makers Congress 2007« roadshow
At the three German venues, namely Hanau (06.09.), Düsseldorf (13.09.) and Munich (25.09.), there will be 21 speeches and keynotes given by experts, in which they will provide answers to practice-related questions on compliance, IT security & infrastructure, email security, mobile security and security management. Participants can put together their own individual programme from the three lists of speeches to be given by market-leading manufacturers, such as, for example, Cisco, Microsoft or Symantec. The topics which will be dealt with are compliance, IT security & infrastructure, email security, mobile security and security management. Also, the latest security solutions will be presented live in the accompanying specialist exhibition.
Among the guests invited to attend the event are users and solution partners who wish to tackle the topic of IT security in an active way and not only as an interdisciplinary task. The event roadshow’s media partners are SearchSecurity.de (www.SearchSecurity.de) and IT-BUSINESS.de (www.IT-Business.de).
If you are interested in attending, you will find a registration form and an agenda at this internet address: www.security-2007.de. The attendance fee is € 289.
More information about Vogel IT Media:
Vogel IT Media, Augsburg/Germany, is a 100 percent subsidiary of Vogel Business Media, Würzburg/Germany. Ever since 1989, the publishing company has been producing specialised media aimed at decision-makers whose jobs involve the production, procurement or use of information technology. Alongside its print and online media features, the company also has a broad portfolio of events to offer. Its most important products and events can be listed as follows: IT-Business, eGovernment Computing, SearchNetworking.de, SearchSecurity.de, Information Security, IT-Security Partner Solution Days, SearchStorage.de, Storage, Storage Partner Solution Days, SearchDataCenter.de and the Virtualisation Solution Days & IT Decision-maker Congress 2007.
If you have any corporate-related queries, please feel free to contact:
Werner Nieberle
Vogel IT-Medien GmbH
Managing Director
August-Wessels-Str. 27
86156 Augsburg
Germany
Tel. +49 (0)821 2177-104
Fax +49 (0)821 2177-156
Email: werner.nieberle@vogel-it.de
www.vogel-it.de
Michael Bernau
Vogel IT-Medien GmbH
TechTarget Deutschland
August-Wessels-Str. 27
86156 Augsburg
Germany
Tel. +49 (0)821 2177-117
Fax +49 (0)821 2177-35117
Email: michael.bernau@techtarget.de
www.techtarget.de