{"id":1267,"date":"2023-10-04T09:22:13","date_gmt":"2023-10-04T09:22:13","guid":{"rendered":"https:\/\/eunis.org\/eunis2023\/?post_type=mec-events&#038;p=1267"},"modified":"2023-10-04T09:22:13","modified_gmt":"2023-10-04T09:22:13","slug":"cyber-security-implementing-zero-trust-and-iso-27000","status":"publish","type":"mec-events","link":"https:\/\/eunis.org\/eunis2023\/events\/cyber-security-implementing-zero-trust-and-iso-27000\/","title":{"rendered":"Cyber security: implementing Zero Trust and ISO 27000"},"content":{"rendered":"<p>This session is organised by EUNIS information security special interest group (InfoSec).<\/p>\n<p>Numbers are limited so pre-booking is recommended.<\/p>\n<p>Agenda<\/p>\n<p>14:00-14:10 Welcome and introduction<\/p>\n<p>14:10 &#8211; 15:00\u00a0 <strong>New ISO 27000 standard (Miran Mizani and Michael Schmidt)<br \/>\n<\/strong>This is an important development, as the ISO standard applies to all facets of information security<\/p>\n<ul>\n<li>What does the new standard do? The Why, How, What of investment in compliance.<\/li>\n<li>Changes in the new revision<\/li>\n<li>Implementation at LRZ M\u00fcnchen<\/li>\n<\/ul>\n<p>15:00-15:20 Coffee Break<\/p>\n<p>15:20 &#8211; 16:30<strong> Zero trust &#8211; A new approach to Multi factor authorisation (Thorsten K\u00fcfer)<br \/>\n<\/strong>Approaches to keep hackers out<\/p>\n<ul>\n<li>What is it\/does it do? Definition.\n<ul>\n<li>Is it totally new?<\/li>\n<li>Combination of current best practices?<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>A new approach to multi factor authorization<\/li>\n<li>Discussion (different use cases \/ implementations at member institutions)<\/li>\n<\/ul>\n<p>16:30-17:00 Sum up of the day and results<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This session is organised by EUNIS information security special interest group (InfoSec). Numbers are limited so pre-booking is recommended. Agenda 14:00-14:10 Welcome and introduction 14:10 &#8211; 15:00\u00a0 New ISO 27000 standard (Miran Mizani and Michael Schmidt) This is an important development, as the ISO standard applies to all facets of information security What does the [&hellip;]<\/p>\n","protected":false},"author":233,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","tags":[],"mec_category":[144],"mec_speaker":[54,110,111,136],"class_list":["post-1267","mec-events","type-mec-events","status-publish","hentry","mec_category-infrastructure-services"],"_links":{"self":[{"href":"https:\/\/eunis.org\/eunis2023\/wp-json\/wp\/v2\/mec-events\/1267","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eunis.org\/eunis2023\/wp-json\/wp\/v2\/mec-events"}],"about":[{"href":"https:\/\/eunis.org\/eunis2023\/wp-json\/wp\/v2\/types\/mec-events"}],"author":[{"embeddable":true,"href":"https:\/\/eunis.org\/eunis2023\/wp-json\/wp\/v2\/users\/233"}],"replies":[{"embeddable":true,"href":"https:\/\/eunis.org\/eunis2023\/wp-json\/wp\/v2\/comments?post=1267"}],"wp:attachment":[{"href":"https:\/\/eunis.org\/eunis2023\/wp-json\/wp\/v2\/media?parent=1267"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eunis.org\/eunis2023\/wp-json\/wp\/v2\/tags?post=1267"},{"taxonomy":"mec_category","embeddable":true,"href":"https:\/\/eunis.org\/eunis2023\/wp-json\/wp\/v2\/mec_category?post=1267"},{"taxonomy":"mec_speaker","embeddable":true,"href":"https:\/\/eunis.org\/eunis2023\/wp-json\/wp\/v2\/mec_speaker?post=1267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}