Legal guidelines for IT managers and management

Trend Micro News

Share post

IT Compliance: Trend Micro publishes a new edition of its legal guide. This is the seventh edition to support IT managers and management with legal information.

Trend Micro presents the new edition of its legal guide. This supports companies with legal issues that need to be considered in the context of IT security. Not least due to the passing of the IT Security Act 2.0, the requirements for organizations in Germany have changed. What IT managers should consider, what challenges there are with critical infrastructures (KRITIS) and how the cloud remains secure in terms of IT compliance are the core topics of the seventh edition.

IT security law, data protection, IT fundamental rights

The new IT security law, data protection and the basic IT law not only present companies with technical, but also legal challenges. With the new edition of its guide on IT security and IT compliance in companies, the Japanese IT security provider has once again compiled and explained the most important legal information for German companies that is relevant to cyber security. In particular, the chapters on the IT Security Act 2.0 and legally secure cloud computing have been added or updated.

Innovations bring complexity with them

The extensive use of IT in companies harbors numerous risks: security gaps and data leaks, cyber attacks, data protection violations and misuse of IT systems by employees can have significant consequences for business activities and may even lead to criminal consequences or claims for damages against the company and management. IT managers are responsible for adhering to compliance regulations and must expect the consequences in case of doubt.

“IT security and IT compliance are of great importance in the context of corporate governance. They ensure that the managing director, board of directors or supervisory board can meet the relevant legal requirements and fulfill their obligations,” says Elize Horn-Zehetbauer, general counsel at Trend Micro. "We hope that with the latest edition of our guide, we can once again offer those responsible in companies a handout that will also help them to solve problems in practice in their everyday work."

Personal Liability?

Cyber ​​attacks are increasing in light of an IT infrastructure that is becoming more and more complex. The COVID-19 pandemic in particular has shown how valuable cloud solutions and home office are on the one hand, but how they can also make companies more vulnerable to attacks. As a result, the topic of responsibility and in particular personal liability is increasingly becoming the focus of attention. In a new, practical case study, the guide specifically addresses the question of the liability of IT managers and board members in the event of misconduct. The guide is available as a free download.

More at TrendMicro.com

 


About Trend Micro

As one of the world's leading providers of IT security, Trend Micro helps create a secure world for digital data exchange. With over 30 years of security expertise, global threat research, and constant innovation, Trend Micro offers protection for businesses, government agencies, and consumers. Thanks to our XGen™ security strategy, our solutions benefit from a cross-generational combination of defense techniques optimized for leading-edge environments. Networked threat information enables better and faster protection. Optimized for cloud workloads, endpoints, email, the IIoT and networks, our connected solutions provide centralized visibility across the entire enterprise for faster threat detection and response.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more