aschuster4you

About Andreas Schuster

Als Experte für Informationssicherheit / Informationssicherheits-Managementsysteme (ISMS), IT-Sicherheit, Authentifizierung, sowie PKI und Verschlüsselung verfügt er über mehr als 20 Jahre technische Erfahrung in Serverinfrastruktur sowie Unternehmensnetzwerkarchitektur. Seine ausgezeichneten Kenntnisse in ISO 27001 und ISA 6 / TISAX ermöglichen es ihm, Kunden in NIS2 Umsetzungen und bei InfoSec Zertifizierungsprozessen effektiv zu unterstützen. Zudem ist er hervorragend mit europäischen Zertifizierungsstellen vernetzt.

Semi­nar: Secu­ri­ty Awa­re­ness — the human firewall

On February 8, 2019, at the Institut & Akademie Interne Revision GmbH in Vienna, Schönbrunnerstr. 218 - 220, under the direction of Manfred Scholz, the seminar Seminar Security Awareness - the human firewall will take place. This seminar teaches the necessary elements of successful security awareness campaigns. Starting from psychological aspects and the typical challenges, [...]

By |2022-11-06T09:52:29+01:0008.01.2019|Events|

Basic Data Pro­tec­tion Regu­la­ti­on (GDPR) Audit Approa­ches and Impacts on Inter­nal Audit Activities

From January 21 to 22, 2019, a training course on the topic of the General Data Protection Regulation (GDPR) Audit Approaches and Impacts on Internal Audit Activities will be held at the Academy of Internal Auditing in Vienna. Primary target group are interested persons in the audit department, IT department, security and data protection officers [...]

Invi­ta­ti­on to the Secu­ri­ty Forum 2018 of the FH Hagen­berg, 2 — 3 May 2018.

For 15 years now, the Hagenberg Circle has been organizing the Security Forum, the annual ICT security conference in Hagenberg, directly on the campus of the Hagenberg University of Applied Sciences. The approximately 200 participants from all over Austria, Germany and Switzerland appreciate the high quality of the presentations and the professional atmosphere of the [...]

By |2024-04-19T18:38:44+02:0008.04.2018|Events|

free GDPR work­shop “What & How” on 25.04.2018 — audit approa­ches to pro­ve accountability

Date 6: Audit approaches to demonstrate accountability. In preparation for the General Data Protection Regulation, SEC4YOU is offering a series of events that focus on the what and how. In the last workshop of the event series, we look at the upcoming audit approaches to demonstrate accountability. In our workshops, defined results of the [...]

By |2024-04-19T18:38:44+02:0005.04.2018|Data protection, Events|

Secu­re on the net with SEC4YOU: 15% dis­count on pene­tra­ti­on tests

Follow the recommendation of experts: perform an infrastructure penetration test at least once a year. When performing penetration tests, we pay attention to a structured approach. To this end, we divide our technical audits into phases according to the recommendation of the German Federal Office for Information Security (BSI): Preparation Information gathering and automatic [...]

By |2024-04-19T18:38:44+02:0005.03.2018|Blog EN|

free GDPR work­shop “What & How” on 21.03.2018 — Risk ana­ly­sis as a preli­mi­na­ry step to data pro­tec­tion impact assessment

Date 5: Risk analysis as a preliminary step to data protection impact assessment. In preparation for the General Data Protection Regulation, SEC4YOU offers a series of events that focus on the what and how. This time, we look at risk analysis as a precursor to data protection impact assessment (DPIA). In workshops, defined results [...]

By |2024-04-19T18:38:44+02:0027.02.2018|Data protection, Events|

free data pro­tec­tion awa­re­ness trai­ning contents

More and more often we are asked how to train data protection and the requirements of the GDPR. For internal data protection officers (DPOs) or, if you don't have a DPO, for the internal data protection contact person, there are numerous training courses and courses for further training in the GDPR requirements. However, familiarization [...]

Employee Data Pro­tec­tion Awa­re­ness: #8 Data Security

The security of data must be guaranteed by appropriate technical and organizational measures. Important objectives include protection against unauthorized access, data loss and manipulation. This principle refers to a wealth of technical and organizational measures that must be taken when storing and processing personal data. Since the terms pseudonymization and encryption are mentioned several times [...]

By |2024-04-19T18:38:44+02:0020.02.2018|Data protection - awareness|

Employee data pro­tec­tion awa­re­ness: #7 Defi­ned dele­ti­on obligations

Personal data must be deleted, for example, after the purpose of the processing no longer applies and the necessary retention periods have expired. It is therefore not permissible to retain personal data for an unlimited period of time. This principle can be implemented most easily by means of a company-wide deletion concept. Here, the different [...]

By |2024-04-19T18:38:44+02:0020.02.2018|Data protection - awareness|
Go to Top