Our Hubs

 

 

 

The hubs of the Cyber ​​Security Council Germany e.V. are the central, subject-specific mental muscles of the association. Decision makers, members and company representatives discuss need for action in the respective sectors and strengthen networking with each other.

 

eHealth Hub

Telemedicine, health apps, digitised hospitals and electronic patient files. The digital transformation of the healthcare system promises more efficient, patient-friendly and nationwide available medical care. At the same time, due to their value, the used data are particularly attractive to cybercriminals and require special protection. Likewise, the systems of hospitals, whose functionality as critical infrastructure is indispensable. The eHealth Hub of the Cyber ​​Security Council Germany e.V. deals with these associated, current issues.

Energy Hub

Blackouts caused by cyberattacks are no longer science fiction scenarios. The interconnection of energy suppliers, power plants and smart meters in personal households promises increased cost and energy efficiency, but also provides a growing target for cybercriminals. The Energy Hub of the Cyber ​​Security Council Germany e.V. provides a platform where policymakers pursue cross-border cooperation on the security of networks and security of supply.

MSC Hub (Management Security Compliance Hub)

Effective information security management systems (ISMS) need reliable, controlled and optimized processes that are anchored horizontally. In order to maintain a high level of ISMS in the overall organization and to comply with laws and standards, companies have to make considerable efforts.

It therefore makes sense to use industry-specific implementation standards, but also to include cross-industry ideas and impulses. Automation potential based on modern digital technologies should also be used. In addition, assistance and basic versions of implementation standards are being developed to help users in practice.

The aim of the MSC Hub is to bring together experts from different industries to enable the effective implementation of an ISMS. The different perspectives on the topic of information security make it possible to develop cross-industry best practice examples and implement them in your own organization. In addition, automation potentials in the implementation and maintenance of an ISMS are examined.

Startup Hub

The need for disruptive cybersecurity solutions in this country is great, as is the dependence on non-European providers. There is a great potential for innovation “made in Europe”, including data and legal certainty. Here, the Startup Hub of the Cyber ​​Security Council Germany e.V. creates a pool of customer-oriented solutions and creates the starting point for constructive networking, deals and support frameworks with the association’s own label for startups.

AI Hub

Artificial Intelligence applications will be just as commonplace in the near future as smartphones are today. It will change all areas of life and will also be an elementary success factor for cybersecurity in the face of the skills shortage and the increasing complexity of cyberspace. The AI ​​Hub of the Cyber ​​Security Council Germany e.V. tasks itself to accompany the advancement of AI technologies under current issues and future-oriented implications. Central to this is the positioning of cyber security as a process enabler for the secure application of AI technologies.

Attribution, Forensics and Intelligence Hub (AFI-Hub)

Attribution is one of the most contentious and complex issues in cybersecurity. Forensic expertise and artificial intelligence must come together in order to assign cyber attacks to devices and thus to those who caused them as quickly as possible. Cyber attacks are becoming more and more sophisticated and the potential for damage is constantly increasing: Malware containing source code stolen from state cyber weapons is currently causing the greatest damage. The AFI Hub is dedicated to the question of how cyber attacks can be assigned, how technical and operational problem solutions and defense mechanisms can be set up and how cyber attacks can be sanctioned.

Datenschutz
Wenn Sie unsere Website besuchen, werden möglicherweise Informationen über Ihren Browser von bestimmten Diensten gespeichert, in der Regel in Form von Cookies. Weitere Informationen finden Sie in unserer Datenschutzerklärung.