Webinar

Get Your Authorization Management Ready for TISAX® (DE)

In today's digital world, protecting sensitive information is of high importance. TISAX® – the Trusted Information Security Assessment Exchange standard – ensures that companies meet the highest security requirements. This standard has established itself as a cross-industry model that guarantees the protection of confidential data and thus strengthens trust between business partners.

Find out more

Speakers

betasystems_portraits-niels-von-der-hude.jpg

Niels von der Hude

Vice President Product Strategy & Development, Beta Systems

As Vice President of Product Strategy & Development at Beta Systems, Niels von der Hude is primarily responsible for the strategic development of the data centre product portfolio. With his professional experience in product management, venture capital and R&D, he promotes and demands close integration between product development and market requirements. He is also a regular speaker at industry events, contributing to the discussion on future-oriented technologies.

arca-consult_klaus-tietze.jpg

Klaus Tietze

Information Security Manager, ARCA-Consult

For over 20 years, Klaus Tietze has been deeply involved in the implementation of Information Security Management Systems (ISMS). His focus is on combining security requirements with efficient application, ensuring the "meaningful implementation" of regulatory and legal requirements for companies.

As a Managing Consultant, he possesses extensive knowledge and practical experience in specialized areas of rights management, including identity access, high-privileged access, and SIEM management. Klaus Tietze has significantly supported clients ranging from SMEs to large corporations in implementing BAIT, VAIT, and KAIT, as well as achieving TISAX® certification.

To obtain TISAX® certification, companies must meet the requirements set out in the VDA-ISA assessment catalog. In our webinar, you will learn how to optimally align your authorization management with TISAX® and which mandatory and optional requirements need to be implemented. Additionally, the principle of minimality, the legal implications of the user lifecycle, and daily compliance through access governance will be explained.

Why is TISAX® so important?

With increasing connectivity and rising demands for information security, companies are required to continuously review and improve their security measures. TISAX® helps to ensure a high level of security by defining comprehensive security standards and enabling standardized assessments. This not only protects your data but also strengthens your competitive position and reduces the risk of security incidents.


Webinar in Cooperation With ARCA-Consult

ARCA-Consult Logo

ARCA-Consult GmbH

ARCA-Consult GmbH is a renowned consulting firm specializing in IT and information security. With extensive expertise, the company supports its clients in reliably protecting their corporate assets.

As a specialist in the implementation and optimization of Identity & Access Management (IAM), ARCA-Consult brings years of experience and in-depth knowledge to address the unique challenges of its clients. Even beyond project completion, ARCA-Consult provides ongoing support—particularly in ensuring compliance with legal and regulatory requirements. This helps facilitate smooth periodic recertifications and audits.

Further Resources

Blog Article
What Is IT Operations Management?

What is SAP Orchestration?

SAP orchestration is a cornerstone for modern enterprises managing complex, hybrid IT landscapes. It streamlines, schedules, and orchestrates IT processes, bridging the growing diversity of SAP and non-SAP platforms.
Blog Article
What Is IT Operations Management?

Agentic Automation: The Road to Governed Autonomous Control

Workload Automation (WLA) has long been the invisible backbone of enterprise operations, orchestrating critical business processes from payroll to financial reconciliation. While essential, the landscape is shifting dramatically. We are moving beyond mere task execution to a new era: Agentic Automation and Governed Autonomous Control. This transformation is reshaping how operations function, driven by the convergence of AI, orchestration, and observability.
Blog Article

What Is Cloud Automation?

With cloud automation, you can improve the scalability of your IT infrastructure, boost governance efficiency, and orchestrate automated tasks. However, due to its broad scope, it is often a difficult process requiring more effort & expertise or a better-tailored automation solution. In this article, we look in-depth into cloud automation: its benefits, features, and challenges. We invite you to read on!