Webinar

Get Your Authorization Management Ready for TISAX® (DE)

In today's digital world, protecting sensitive information is of high importance. TISAX® – the Trusted Information Security Assessment Exchange standard – ensures that companies meet the highest security requirements. This standard has established itself as a cross-industry model that guarantees the protection of confidential data and thus strengthens trust between business partners.

Find out more

Speakers

Niels von der Hude

Director Product Strategy, Beta Systems

Niels von der Hude has been a well-known figure in the Identity & Access Management market for many years. In his role as Director Product Strategy, he and his team at Beta Systems are responsible for the product design of the Garancy IAM Suite and at the same time a widely recognised thought leader in identity management as a whole.

He holds a degree in Electrical Engineering from the Technical University of Berlin and completed the General Management Programme at INSEAD.

Klaus Tietze

Information Security Manager, ARCA-Consult

For over 15 years, Klaus Tietze has been deeply involved in the implementation of Information Security Management Systems (ISMS). His focus is on combining security requirements with efficient application, ensuring the "meaningful implementation" of regulatory and legal requirements for companies.

As a Managing Consultant, he possesses extensive knowledge and practical experience in specialized areas of rights management, including identity access, high-privileged access, and SIEM management. Klaus Tietze has significantly supported clients ranging from SMEs to large corporations in implementing BAIT, VAIT, and KAIT, as well as achieving TISAX® certification.

To obtain TISAX® certification, companies must meet the requirements set out in the VDA-ISA assessment catalog. In our webinar, you will learn how to optimally align your authorization management with TISAX® and which mandatory and optional requirements need to be implemented. Additionally, the principle of minimality, the legal implications of the user lifecycle, and daily compliance through access governance will be explained.

Why is TISAX® so important?

With increasing connectivity and rising demands for information security, companies are required to continuously review and improve their security measures. TISAX® helps to ensure a high level of security by defining comprehensive security standards and enabling standardized assessments. This not only protects your data but also strengthens your competitive position and reduces the risk of security incidents.


Webinar in Cooperation With ARCA-Consult

ARCA-Consult GmbH

ARCA-Consult is a prestigious consultancy firm specialised in IT and information security, digitisation and audit-proof preparations for certification.

Find out more

Images

Overview

Date
February 22, 2022
Language
German
Duration
60 minutes
Online

Contact us

Beta Systems Software AG
Alt-Moabit 90d
10559 Berlin
Germany

Share

Further Resources

Insight

IT Security in Logistics: Why IAM Is Important for Logistics Companies

In a world where global supply chains form the backbone of our economy, the logistics industry is facing enormous opportunities, but also challenges. Efficient and timely delivery of goods is now more important than ever, but increasing digitalization also comes with greater risks and requirements. While digital innovations boost efficiency, they also make the industry more vulnerable to cyber threats and associated data loss. In this context, Identity and Access Management (IAM) is becoming an indispensable tool to protect logistics companies and maximize their efficiency. This article explains why IAM is so essential for the logistics industry and how it can help overcome the many challenges it faces.
Whitepaper

IAM Implementation Methodology

In our whitepaper, “Methodology of an IAM Introduction,” you will discover how to successfully implement Identity & Access Management (IAM) to enhance the efficiency and security of your IT infrastructure. Given the complexity and challenges of IAM projects, thorough planning and a systematic approach are essential. Our free whitepaper offers a comprehensive guide to navigating these intricacies and achieving successful IAM implementation.
Whitepaper

Segregation of Duties: Proper Implementation of Critical Compliance Requirements

Explore the essential drivers and requirements for segregation of functions in our detailed whitepaper, drafted in collaboration with KPMG AG Wirtschaftsprüfungsgesellschaft. This comprehensive guide not only covers legal mandates and administrative directives but also highlights the internal interests that support a clean segregation of functions within a company.