Guest Lecture at the TU Munich: Practical Insights into Cyber Security Audits and Compliance

6. December 2023

Many people don't realize how much influence cyber security standards have on our daily lives. The credit card security standard PCI DSS is a great example for this, since with each transaction we rely on our card information being protected against theft or misuse. To ensure this, the PCI DSS contains strict security requirements that all companies who accept credit card payments must comply with.

In their guest lecture on December 1 at the Technical University of Munich, our colleagues Lea Straumann, Senior Consultant Security Audits & PCI and Jan Kemper, Head of Security Audits, explained how this works in detail, intoduced the students to different security standards and provided further background information on cyber security and compliance.

"Most of us rarely come across security standards such as PCI DSS, SWIFT or KRITIS during our studies. But those security standards are important and shape the world of cyber security. That's why we are more than happy that we had the opportunity to share our knowledge with the students this semester and give them an insight into our work," says Lea Straumann.

"Especially in a fast-moving industry like ours, it's very important not to lose sight of the practical side of things alongside the theory. Sharing our knowledge offers students interesting insights into our day-to-day work and I enjoy it every time," adds Jan Kemper.

The lecture took place as part of a lecture series on system security. The Technical University of Munich hosts this lecture to enable its students to exchange ideas with representatives from industry and research institutions and learn about their challenges, methods and existing solutions in a practical way.

Also interesting:

DORA Deep Dive: Threat-Led Penetration Testing (TLPT)

DORA Deep Dive: Threat-Led Penetration Testing (TLPT)

Since the publication of the original blog post in May 2024, the final version of the RTS for TLPT has been released. The blog post has been updated accordingly and now covers the current requirements. The Digital Operational Resilience Act (DORA) came into force on...

Red Teaming: 5 Questions Every IT Leader Wants Answered

Red Teaming: 5 Questions Every IT Leader Wants Answered

Many companies invest in firewalls, endpoint protection, and awareness training, assuming that this puts them in a strong position. But the reality is different: attackers do not think in terms of tools, but in terms of targets. They combine technical vulnerabilities...

Categories

Categories