This website uses Facebook's interaction pixel for statistical purposes. With the help of a cookie, it can be understood how our marketing measures are received and potentially improved on Facebook. We would be pleased to obtain your agreement with this. Information about the "Facebook pixel", about cookies and your right of withdrawal can be found in our privacy policy where you can change your cookie settings. By clicking "accept cookies" you agree to the use of cookies.


“There are two types of companies: those that have been hacked, and those who don't know they have been hacked.“ John T. Chambers, former CEO of Cisco Systems

IT security is a sensitive issue at a time when cyberattacks are regularly making headlines. In our opinion, protection is an ongoing process. It is not enough to stick to a system statically, but new ways and means have to be tried again and again in order to ensure greater IT security.

One idea to increase protection against IT encroachment is to selectively disconnect from the full dependence on digital complexity and connectivity by identifying key processes and functions and then redirecting the digital paths that attackers could use to reach, reduce or eliminate them. The CCE (consequence-driven, cyber-informed engineering) method, developed by the Idaho National Lab, is not a one-off risk assessment, but is designed to change the mindset and balance of strategic cyber risks for the company.