{"id":1673,"date":"2023-07-14T09:40:19","date_gmt":"2023-07-14T09:40:19","guid":{"rendered":"https:\/\/gb22.eco.de\/it-security\/"},"modified":"2023-09-19T15:18:23","modified_gmt":"2023-09-19T15:18:23","slug":"it-security","status":"publish","type":"page","link":"https:\/\/gb22.eco.de\/en\/eco-board\/it-security\/","title":{"rendered":"IT Security"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/gb22.eco.de\/vorstand\/\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/\u200eBanner.\u200e003-1024x179.jpeg\" alt=\"\" class=\"wp-image-799\" style=\"width:1144px;height:200px\" width=\"1144\" height=\"200\" srcset=\"https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/\u200eBanner.\u200e003-1024x179.jpeg 1024w, https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/\u200eBanner.\u200e003-300x52.jpeg 300w, https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/\u200eBanner.\u200e003-768x134.jpeg 768w, https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/\u200eBanner.\u200e003.jpeg 1144w\" sizes=\"auto, (max-width: 1144px) 100vw, 1144px\" \/><\/a><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\">IT Security<\/h1>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-28f84493 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/Norbert-Pohlmann.jpg\" alt=\"\" class=\"wp-image-443\" srcset=\"https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/Norbert-Pohlmann.jpg 1000w, https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/Norbert-Pohlmann-300x300.jpg 300w, https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/Norbert-Pohlmann-150x150.jpg 150w, https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/Norbert-Pohlmann-768x768.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>In 2022, the degree of threat emanating from cyberspace was greater than ever before. Ransomware attacks can be noted as the main cause of the enormous damage: DDoS attacks increased by 42 per cent and the number of vulnerabilities in software rose by ten per cent.  <\/p>\n\n\n\n<p>The IT security situation, which was already tense, thus became even more acute. Due to digital transformation, the targets of attacks are continuously becoming more lucrative, given that more assets are available in digital form. More and more complex IT systems and infrastructures are not just increasing dependencies and the share of software, but also the number of connections between the IT systems. On top of that, a growing number of suppliers are also becoming involved. As a result, the attack surface is visibly increasing. Arising from this development, the criminal ecosystems are becoming all the more successful, meaning that the attackers\u2019 methods are not only more intelligent, but can also be implemented on an automated basis.    <\/p>\n\n\n\n<p>All of these aspects make it abundantly clear as to how essential cybersecurity is for our digitalization, in order to be able to shape a secure and trustworthy future.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Digital identities<\/h2>\n\n\n\n<p>More and more services are shifting from the analogue to the digital world. <\/p>\n\n\n\n<p>In order for users to be able to confidently use online services \u2013 regardless of whether they are provided by public or private providers \u2013 what is needed is a secure and Europe-wide standardised solution for authentication.<br><\/p>\n\n\n\n<p>In spring 2022, the analyst firm techconsult surveyed approximately 300 citizens, 170 companies and 40 public authorities on behalf of eco in order to compile the study \u201c<a href=\"https:\/\/international.eco.de\/studie-security-digital-identities-in-a-digitalised-world\/\">Security &amp; Digital Identities in a Digitalised World<\/a>\u201d. One of the study\u2019s findings showed that 35 per cent of the citizens surveyed would like to have a central digital identity. <\/p>\n\n\n\n<p>The advantages of digital identities for companies, public authorities and citizens are manifold: a well-functioning infrastructure for digital identities will increase the degree of digitalisation of many processes, significantly improve privacy protection, be of great economic relevance, and also create a high level of acceptance for the digital future. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Security Competence Group<\/h2>\n\n\n\n<p>\u201cDigital Identities\u201d was also one of the main topics of the Security CG in 2022. As such, the CG met in Cologne on the topic of &#8220;Security &amp; Digital Identities in a Digitalised World&#8221;, having already organised a meeting on \u201c<a href=\"https:\/\/www.eco.de\/news\/nachbericht-kg-sicherheit-sichere-software-entwicklung\/\">Secure Software and Software Development<\/a>\u201d at it-sa. <\/p>\n\n\n\n<p>The <a href=\"https:\/\/international.eco.de\/presse\/eco-it-security-survey-2023-many-companies-still-underestimate-the-threat-situation\/\">IT Security Survey<\/a> \u2013 conducted last year by the Security Competence Group \u2013 shows that ransomware was once again seen as the biggest threat in 2022.<br>In the 2023 IT Security Survey, employee awareness and contingency planning were the top security measures, closely followed by the topics of cloud security and data encryption.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Anti-Abuse Competence Group<\/h2>\n\n\n\n<p>The Anti-Abuse CG is a closed working group which plays a particular role in serving the confidential exchange between hosters and ISPs. Within the framework of the topDNS initiative, the members of the CG developed a catalogue for the definition of abuse cases and participated in an EU Commission workshop to flesh out the topic of DNS abuse and to explain the terminology to the Commissions\u2019 participants. <\/p>\n\n\n\n<p>All in all, the working group made valuable contributions to the development of the German coalition agreement\u2019s positions and to the Ransomware Initiative.<\/p>\n\n\n\n<p><strong>Active participation in commenting on the German coalition agreement<\/strong><\/p>\n\n\n\n<p>As part of a member workshop involving the Anti-Abuse Competence Group and the Security Competence Group, eco developed a statement on the specific positions of the German coalition agreement. The determination of the new German federal government to advance IT security and to call on it from business and public authorities is an important step towards strengthening digital security, and is also a great opportunity for both the industry and the European market. <\/p>\n\n\n\n<p>Important signals include: a clear rejection of indiscriminate retention of traffic data, the requirement for strong encryption for all, a clear obligation to disclose or report security vulnerabilities, and the strengthening of the German Federal Office for Information Security (BSI) as a central body for IT security.<\/p>\n\n\n\n<p>The points noted demonstrate the commitment to the following: to strengthen IT security; to make this a requirement in the design process of new devices, services and software projects; and to also promote it. In addition, this is accompanied by a strengthening of personal data protection. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Congresses and trade fairs<\/h2>\n\n\n\n<p>In 2022, eco was present at numerous events and trade fairs regarding IT security. In May 2022, for example, eco provided a presentation at the Cybersecurity Day of the Alliance for Cybersecurity, which finally took place again after a long break. eco also had representatives at the IT Security Day NRW in Siegen, the SEC-IT of Heise Verlag and the \u201cHuman Firewall Conference\u201d in Cologne.  <\/p>\n\n\n\n<p>At it-sa \u2013 Europe\u2019s largest trade fair for IT security \u2013 eco presented itself in 2022 with a joint stand and its (anti-)Ransomware Initiative. In this setting, Markus Schaffrin, Head of Member Services, held an <a href=\"https:\/\/international.eco.de\/presse\/eco-at-it-sa-2022-shaping-it-security-together\/\">expert talk<\/a> together with the partners of the Ransomware Initiative, while the Security CG met on the topic of \u201cSecure Software and Software Development\u201d. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">ISD 2022<\/h2>\n\n\n\n<p>From 29 to 30 September 2022, the <a href=\"https:\/\/international.eco.de\/events\/internet-security-days-2022\/\">Internet Security Days (ISD)<\/a> returned to Phantasialand near Cologne: 31 presentations in four main topics attracted IT experts from all over Germany to discuss IT security challenges on site in Br\u00fchl, and helped to maintain old contacts and to cultivate new ones. <\/p>\n\n\n\n<p>The extensive conference programme and the accompanying exhibition offered ample space for networking and exchanging experiences. With around 250 participants per day, the <a href=\"https:\/\/www.eco.de\/news\/it-sicherheit-fuer-eine-verschaerfte-bedrohungslage-das-waren-die-isd-2022\/\">12th <\/a><a href=\"https:\/\/international.eco.de\/news\/the-internet-security-days-2022\/\">Internet Security Days<\/a> in Phantasialand Br\u00fchl were a complete success. <\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ransomware Initiative<\/h2>\n\n\n\n<p>As the war in Ukraine continues, the cyber threat situation has intensified. In particular, companies and public authorities are affected by attacks with ransomware. According to the German Federal Office for Information Security (BSI), cybersecurity attacks of this kind are becoming the greatest IT security threat. This corresponds with the results of the eco Association\u2019s annual IT Security Survey, as the respondents also considered ransomware to be 2022\u2019s greatest threat. For this reason, eco launched the German \u201c<a href=\"https:\/\/www.eco.de\/initiative-ransomware\/\">Ransomware Initiative<\/a>\u201d.     Together with partners Microsoft, Rohde&amp;Schwarz and Sophos, the defined goal is to raise awareness of how ransomware endangers companies and what measures can be taken against it. The <a href=\"https:\/\/www.eco.de\/initiative-ransomware\/\">Ransomware Initiative<\/a> serves as a contact and information point for small and medium-sized enterprises and connects them with security authorities and partners from the IT security industry.<\/p>\n\n\n\n<p><em>Prof. Dr. Norbert Pohlmann<br>eco Board Member for IT Security<\/em><\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>IT Security In 2022, the degree of threat emanating from cyberspace was greater than ever before. Ransomware attacks can be noted as the main cause of the enormous damage: DDoS attacks increased by 42 per cent and the number of vulnerabilities in software rose by ten per cent. The IT&#8230;<a class=\"eco-loop-button\" href=\"https:\/\/gb22.eco.de\/en\/eco-board\/it-security\/\">Read More<\/a><\/p>\n","protected":false},"author":20,"featured_media":0,"parent":1685,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"class_list":["post-1673","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IT Security - eco Gesch\u00e4ftsbericht 2022<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gb22.eco.de\/en\/eco-board\/it-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Security - eco Gesch\u00e4ftsbericht 2022\" \/>\n<meta property=\"og:description\" content=\"IT Security In 2022, the degree of threat emanating from cyberspace was greater than ever before. Ransomware attacks can be noted as the main cause of the enormous damage: DDoS attacks increased by 42 per cent and the number of vulnerabilities in software rose by ten per cent. The IT...Read More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gb22.eco.de\/en\/eco-board\/it-security\/\" \/>\n<meta property=\"og:site_name\" content=\"eco Gesch\u00e4ftsbericht 2022\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-19T15:18:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/Norbert-Pohlmann.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gb22.eco.de\/en\/eco-board\/it-security\/\",\"url\":\"https:\/\/gb22.eco.de\/en\/eco-board\/it-security\/\",\"name\":\"IT Security - eco Gesch\u00e4ftsbericht 2022\",\"isPartOf\":{\"@id\":\"https:\/\/gb22.eco.de\/#website\"},\"datePublished\":\"2023-07-14T09:40:19+00:00\",\"dateModified\":\"2023-09-19T15:18:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/gb22.eco.de\/en\/eco-board\/it-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gb22.eco.de\/en\/eco-board\/it-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gb22.eco.de\/en\/eco-board\/it-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/gb22.eco.de\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"eco Board\",\"item\":\"https:\/\/gb22.eco.de\/en\/eco-board\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IT Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gb22.eco.de\/#website\",\"url\":\"https:\/\/gb22.eco.de\/\",\"name\":\"eco Gesch\u00e4ftsbericht 2022\",\"description\":\"Gesch\u00e4ftsbericht 2022\",\"publisher\":{\"@id\":\"https:\/\/gb22.eco.de\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gb22.eco.de\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/gb22.eco.de\/#organization\",\"name\":\"eco Gesch\u00e4ftsbericht 2022\",\"url\":\"https:\/\/gb22.eco.de\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gb22.eco.de\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/Logo_GB2022.svg\",\"contentUrl\":\"https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/Logo_GB2022.svg\",\"caption\":\"eco Gesch\u00e4ftsbericht 2022\"},\"image\":{\"@id\":\"https:\/\/gb22.eco.de\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Security - eco Gesch\u00e4ftsbericht 2022","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gb22.eco.de\/en\/eco-board\/it-security\/","og_locale":"en_US","og_type":"article","og_title":"IT Security - eco Gesch\u00e4ftsbericht 2022","og_description":"IT Security In 2022, the degree of threat emanating from cyberspace was greater than ever before. Ransomware attacks can be noted as the main cause of the enormous damage: DDoS attacks increased by 42 per cent and the number of vulnerabilities in software rose by ten per cent. The IT...Read More","og_url":"https:\/\/gb22.eco.de\/en\/eco-board\/it-security\/","og_site_name":"eco Gesch\u00e4ftsbericht 2022","article_modified_time":"2023-09-19T15:18:23+00:00","og_image":[{"url":"https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/Norbert-Pohlmann.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/gb22.eco.de\/en\/eco-board\/it-security\/","url":"https:\/\/gb22.eco.de\/en\/eco-board\/it-security\/","name":"IT Security - eco Gesch\u00e4ftsbericht 2022","isPartOf":{"@id":"https:\/\/gb22.eco.de\/#website"},"datePublished":"2023-07-14T09:40:19+00:00","dateModified":"2023-09-19T15:18:23+00:00","breadcrumb":{"@id":"https:\/\/gb22.eco.de\/en\/eco-board\/it-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gb22.eco.de\/en\/eco-board\/it-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/gb22.eco.de\/en\/eco-board\/it-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gb22.eco.de\/en\/"},{"@type":"ListItem","position":2,"name":"eco Board","item":"https:\/\/gb22.eco.de\/en\/eco-board\/"},{"@type":"ListItem","position":3,"name":"IT Security"}]},{"@type":"WebSite","@id":"https:\/\/gb22.eco.de\/#website","url":"https:\/\/gb22.eco.de\/","name":"eco Gesch\u00e4ftsbericht 2022","description":"Gesch\u00e4ftsbericht 2022","publisher":{"@id":"https:\/\/gb22.eco.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gb22.eco.de\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/gb22.eco.de\/#organization","name":"eco Gesch\u00e4ftsbericht 2022","url":"https:\/\/gb22.eco.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gb22.eco.de\/#\/schema\/logo\/image\/","url":"https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/Logo_GB2022.svg","contentUrl":"https:\/\/gb22.eco.de\/wp-content\/uploads\/sites\/8\/2023\/07\/Logo_GB2022.svg","caption":"eco Gesch\u00e4ftsbericht 2022"},"image":{"@id":"https:\/\/gb22.eco.de\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/gb22.eco.de\/en\/wp-json\/wp\/v2\/pages\/1673","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gb22.eco.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/gb22.eco.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/gb22.eco.de\/en\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/gb22.eco.de\/en\/wp-json\/wp\/v2\/comments?post=1673"}],"version-history":[{"count":2,"href":"https:\/\/gb22.eco.de\/en\/wp-json\/wp\/v2\/pages\/1673\/revisions"}],"predecessor-version":[{"id":1825,"href":"https:\/\/gb22.eco.de\/en\/wp-json\/wp\/v2\/pages\/1673\/revisions\/1825"}],"up":[{"embeddable":true,"href":"https:\/\/gb22.eco.de\/en\/wp-json\/wp\/v2\/pages\/1685"}],"wp:attachment":[{"href":"https:\/\/gb22.eco.de\/en\/wp-json\/wp\/v2\/media?parent=1673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}