Are you prepared if quantum computers crack your data tomorrow?26.06.2025| André Clerc | Presentation Read article
Security Champions in the Field - From pure Awareness to a genuine Security Culture06.06.2025| Markus Günther | Article Read article
AI Compliance Essentials: Standards and Emerging Regulations22.10.2024| Bruno Blumenthal | Presentation Read article
Post Quantum Cryptography - Do the Locks Used Hold Up?11.09.2024| Markus Günther | Article Read article
How you can Incorporate your Company's own Data into a Generative AI Application10.06.2024| Michael Veser | Article Read article
Against the Procured Security Incident - Supply Chain Risk Management18.03.2024| Bruno Blumenthal | Article Read article
One size fits all was yesterday - efficient awareness made @SBB24.10.2023| Markus Günther et al. | Presentation Read article
How a Key Management System Can Help You With FADP Compliance19.06.2023| Michael Veser | Article Read article
The Challenges of Online Meetings: How To Make Your Meeting a Success02.06.2022| Daniel Brunner | Article Read article
The Elegance of Let's Encrypt in an Internal PKI01.12.2021| André Clerc et al. | Article Read article
Corporate Resilience from Cyber Risk and Corporate Risk Perspective09.11.2021| Christoph Koch | Commentary Read article
Threat Analysis of the EKANS Ransomware - How Honda had to Stop Production15.12.2020| Gregor Walter | Article Read article
Central Authentication and Authorization Management - An Opportunity for the Future12.10.2020| Thomas Bühler | Article Read article
2FA for the authentication of HCP at the EPR and in the cloud06.03.2020| Thomas Kessler | Presentation Read article
Die Verwaltung von GFP im EPD: Sisyphos ruft Herkules05.03.2020| Thomas Kessler | Presentation Read article
The EPR in the field of tension between self-determination and data analysis28.08.2019| Thomas Kessler | Presentation Read article
2-factor Authentication: Not Only Important for the EPR!01.03.2019| Thomas Kessler | Article Read article
EPR: opportunities and risks of informational self-determination07.06.2018| Thomas Kessler | Presentation Read article
Informational Self-Determination: How do we Deal with the Upcoming Upheaval?14.05.2018| Thomas Kessler | Article Read article
EPR connection of the University Hospital Basel - implementation of important use cases08.03.2018| Thomas Kessler et al. | Presentation Read article
Priceless: New Swift Rules for Financial Service Providers21.11.2017| André Clerc | Article Read article
Selected aspects of the GDPR and their significance for IT in Switzerland27.06.2017| Stephan Töndury | Presentation Read article
Cybersecurity in the EPR - tasks, competencies and responsibilities (AKV)09.03.2017| Thomas Kessler | Presentation Read article
The EPR as a Litmus Test for Informational Self-Determination16.08.2016| Adrian Bachmann | Article Read article
ICT security management - the tension between business and technology10.03.2016| Daniel Felix Maurer | Presentation Read article
Prevention, Detection and Response: Why Pure Prevention Is Not (or No Longer) Enough25.09.2015| Adrian Bachmann | Article Read article
IAM Vision 2025 - IAM concepts beyond Role Based Access Control23.09.2015| Thomas Kessler et al. | Presentation Read article
Introduction of a role-based IAM - A practical report19.09.2013| Adrian Bachmann et al. | Presentation Read article
ISMS in the IT project approach - aspiration and reality18.09.2012| Daniel Felix Maurer | Presentation Read article